2017
DOI: 10.1109/access.2017.2695561
|View full text |Cite
|
Sign up to set email alerts
|

Personal Privacy Protection Framework Based on Hidden Technology for Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…• Data loss. Hidden volumes are concealed inside the outer volume [7][8][9][10][11], but the outer volume does not know the existence of hidden volumes. Therefore, it is likely to write data on the storage blocks that are occupied by hidden volumes.…”
Section: Outer Volume's Viewmentioning
confidence: 99%
See 4 more Smart Citations
“…• Data loss. Hidden volumes are concealed inside the outer volume [7][8][9][10][11], but the outer volume does not know the existence of hidden volumes. Therefore, it is likely to write data on the storage blocks that are occupied by hidden volumes.…”
Section: Outer Volume's Viewmentioning
confidence: 99%
“…• Device reboot. State-of-the-art works use two modes in their system, namely, the nor-70 mal mode and the PDE mode [7][8][9][10][11]. The normal mode uses the outer volume while the PDE mode uses the hidden volume, respectively.…”
Section: Outer Volume's Viewmentioning
confidence: 99%
See 3 more Smart Citations