Login / Signup
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Peiyu Liu
Shouling Ji
Lirong Fu
Kangjie Lu
Xuhong Zhang
Jingchang Qin
Wenhai Wang
Wenzhi Chen
Published in:
SP (2023)
Keyphrases
</>
sensitive data
data sets
database
location information
data privacy
data analysis
management system
original data
data structure
data sources
raw data
sensitive information
malicious users
cloud computing
data sharing