Faux disk encryption: realities of secure storage on mobile devices.
Drew SuarezDaniel MayerPublished in: MOBILESoft (2016)
Keyphrases
- mobile devices
- remote server
- storage devices
- storage systems
- key exchange
- encryption scheme
- key management
- read write
- data encryption
- security properties
- smart phones
- security analysis
- random access
- digital signature
- secondary storage
- data confidentiality
- encrypted data
- disk access
- data storage
- solid state
- main memory
- cryptographic protocols
- integrity verification
- stream cipher
- encryption decryption
- mobile phone
- cloud storage
- mobile users
- public key cryptography
- mobile learning
- disk drives
- data security
- tertiary storage
- data integrity
- secret key
- authentication scheme
- high security
- secure communication
- sensitive data
- private key
- image encryption
- diffie hellman
- cryptographic algorithms
- security requirements
- magnetic tape
- mobile commerce
- mobile applications
- public key
- advanced encryption standard
- security issues
- smart card
- file system
- context aware
- mutual authentication
- digital rights management
- key distribution
- encryption algorithm
- flash memory
- network communication
- fit in main memory
- security model
- encryption algorithms
- data sharing
- provably secure
- standard model