Toward securing untrusted storage without public-key operations
Proceedings of the 2005 ACM workshop on Storage security and survivability
Security in wireless sensor networks: Research Articles
Wireless Communications & Mobile Computing
Hardware Support for Secure Processing in Embedded Systems
IEEE Transactions on Computers
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Plutus: scalable secure file sharing on untrusted storage
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Energy comparison of AES and SHA-1 for ubiquitous computing
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Hi-index | 0.00 |
Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobile personal computers (UMPCs) have become very popular as an access point of important information because of benefits such as small size and mobility. However, because of their high probability of loss or theft, it can turn into a point of information leakage. This is the reason why protection mechanism for confidential information stored in mobile devices have become a need. In this paper, a confidential information protection system for mobile devices is proposed, which is composed of a secure file system and a set of protocols. To show the security of our solution, we have performed an analysis of possible attacks. Additionally, we have developed client/server application prototypes using C# to demonstrate its implementation feasibility for a real environment. Copyright © 2012 John Wiley & Sons, Ltd. (In this paper, a confidential information protection system for mobile devices is proposed, which is composed of a secure file system and a set of protocols. To show the security of our solution, we have performed an analysis of possible attacks. Additionally, we have developed client/server application prototypes using C# to demonstrate its implementation feasibility for a real environment.)