2017
DOI: 10.1109/mcom.2017.1600349cm
|View full text |Cite
|
Sign up to set email alerts
|

Who Moved My Data? Privacy Protection in Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
11

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 129 publications
(26 citation statements)
references
References 12 publications
0
15
0
11
Order By: Relevance
“…Certos tipos de permissões trazem riscos à privacidade, pois alguns aplicativos capturam mais do que seria necessário para executar suas funções. Captura abusiva de dados são mais difíceis de serem detectados do que um vírus (Dai et al, 2017). Tabela 3.…”
Section: Permissõesunclassified
“…Certos tipos de permissões trazem riscos à privacidade, pois alguns aplicativos capturam mais do que seria necessário para executar suas funções. Captura abusiva de dados são mais difíceis de serem detectados do que um vírus (Dai et al, 2017). Tabela 3.…”
Section: Permissõesunclassified
“…In the proposed security scheme based on key disturbance, the base station shares a key with each sensor node in the proposed scheme. The data uploaded is composed of the original data and the key of the node, and the privacy protection of the original data and the aggregated data is realized [7]. In the data aggregation privacy protection protocol proposed by Arora et al, the base station and other nodes are unable to obtain the privacy data of a single node [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…an advanced persistent threat (APT), refers to a type of threat in which threat actors actively pursue and compromise the entity infrastructure of a target while maintaining anonymity [1]- [3]. APT attacks are of particular concern for organizations and individuals whose information is at risk of a data breach [4]. Among an assortment of ways to deliver APT attacks, the act of sending an email from an account purporting to be a trusted sender to specific and wellresearched targets is known as a targeted email attack or spear phishing.…”
Section: Introductionmentioning
confidence: 99%