Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?
Eirini AnthiGeorge TheodorakopoulosPublished in: ATCS/SePrIoT@SecureComm (2017)
Keyphrases
- sensitive data
- privacy preserving
- data storage
- information security
- sensitive information
- smart card
- data confidentiality
- data sharing
- protection mechanisms
- mobile devices
- confidential data
- third party
- malicious users
- data privacy
- security concerns
- privacy preservation
- privacy protection
- mobile applications
- security threats
- personal data
- unauthorized access
- database applications
- access control