Survey on Reverse‐Engineering Tools for Android Mobile Devices

A Albakri, H Fatima, M Mohammed… - Mathematical …, 2022 - Wiley Online Library
With the presence of the Internet and the frequent use of mobile devices to send several
transactions that involve personal and sensitive information, it becomes of great importance …

Information security in M-learning systems: Challenges and threats of using cookies

D Korać, B Damjanović, D Simić - 2020 19th International …, 2020 - ieeexplore.ieee.org
The trend of rapid development of mobile technologies has highlighted new challenges and
threats regarding the information security by the using cookies in mobile learning (m …

HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System

N Chen, B Chen - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
A plausibly deniable storage (PDS) system not only conceals the plaintext of sensitive data,
but also hides their very existence. It can essentially mitigate a novel coercive attack, in …

An efficient privacy protection scheme for data security in video surveillance

L Du, W Zhang, H Fu, W Ren, X Zhang - Journal of visual communication …, 2019 - Elsevier
The advancement in video surveillance has raised significant concerns about privacy
protection. The existing methods focus on identifying the sensitive region and preserving the …

Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment

D Korać, D Simić - Computers & Security, 2019 - Elsevier
The trend of rapid evolutionary development of mobile technologies and the existence of
different user's priorities are creating new challenges with regard to selection of multifactor …

A cross-layer plausibly deniable encryption system for mobile devices

N Chen, B Chen, W Shi - … Conference on Security and Privacy in …, 2022 - Springer
Mobile computing devices have been used to store and process sensitive or even mission
critical data. To protect sensitive data in mobile devices, encryption is usually incorporated …

A symbiotic relationship based leader approach for privacy protection in location based services

H Alrahhal, MS Alrahhal, R Jamous… - … International Journal of …, 2020 - mdpi.com
Location-based services (LBS) form the main part of the Internet of Things (IoT) and have
received a significant amount of attention from the research community as well as …

Multiply information coding and hiding using fuzzy vault

K Koptyra, MR Ogiela - Soft Computing, 2019 - Springer
In this paper we show some new ideas of hiding several secrets with the use of fuzzy vault
construction and, in addition, a few systems based on presented concept. The main …

MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot

W Feng, C Liu, Z Guo, T Baker, G Wang… - Future Generation …, 2020 - Elsevier
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE)
systems provide an effective manner to protect sensitive data by hiding them on the device …

Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research Directions

AK Gupta, U Shanker - Wireless Personal Communications, 2024 - Springer
Context-aware computing processes the mobile user's query/transaction submitted from
anywhere at any time. Basically, location based services (LBSs) are continuous, local, and …