2014 IEEE International Advance Computing Conference (IACC) 2014
DOI: 10.1109/iadcc.2014.6779350
|View full text |Cite
|
Sign up to set email alerts
|

Anti-theft application for android based devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Table 1 shows the comparison of the proposed system with the existing solutions. It shows that the proposed blockchain based mobile theft prevention system not only provides Anti-theft and tracking features, that solutions [1][2][3][4][5][6][7] provides, but also preserves the user's privacy and data, provides security against malicious third-party, secure platform for transaction or Sale/Purchase of device and Transfer of Ownership of device. Therefore, the proposed scheme overcomes the problem in the existing solutions.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 1 shows the comparison of the proposed system with the existing solutions. It shows that the proposed blockchain based mobile theft prevention system not only provides Anti-theft and tracking features, that solutions [1][2][3][4][5][6][7] provides, but also preserves the user's privacy and data, provides security against malicious third-party, secure platform for transaction or Sale/Purchase of device and Transfer of Ownership of device. Therefore, the proposed scheme overcomes the problem in the existing solutions.…”
Section: Resultsmentioning
confidence: 99%
“…A. Khan at el (2014) [5] proposed a technique to improve anti-theft which uses MMS. This technique was dependent on the hardware (camera) and support for multimedia messaging.…”
Section: Related Workmentioning
confidence: 99%
“…For factory reset through settings, user have to pass the biometric fingerprint authentication allowing access to settings and selecting back up and reset option in which factory reset is selected. User need to turn on the Wi-Fi/data plan and location service to proceed further and enter correct back-up code which will reset mobile device after 5 hrs when the number of attempt exceed 3, in 4 th attempt the front and back camera will capture the image, GPS co-ordinate and send to the alternate email-id [12]. In 5 th attempt phone will get switch off, to switch on the phone user needs to visit phone gallery.…”
Section: Phase Two: Securing Against Factory Resetmentioning
confidence: 99%