“a stalker's paradise” how intimate partner abusers exploit technology

D Freed, J Palmer, D Minchala, K Levy… - Proceedings of the …, 2018 - dl.acm.org
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - Computer Standards & …, 2019 - Elsevier
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …

A lightweight secure data sharing scheme for mobile cloud computing

R Li, C Shen, H He, X Gu, Z Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the popularity of cloud computing, mobile devices can store/retrieve personal data from
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …

Secure halftone image steganography based on pixel density transition

W Lu, Y Xue, Y Yeung, H Liu, J Huang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most state-of-the-art halftone image steganographic techniques only consider the flip**
distortion according to the human visual system, which are not always secure when they are …

Deftl: Implementing plausibly deniable encryption in flash translation layer

S Jia, L ** biometric data secure is a general
problem. Many studies have presented various ways of protecting biometric data especially …

An application-layer plausibly deniable encryption system for wearable devices

N Chen, B Chen, W Shi - Discover Internet of Things, 2024 - Springer
Wearable devices especially smartwatches are widely used in our daily life. With their
increased use, a large amount of sensitive data are collected, stored, and managed in those …

Digital privacy perceptions of asylum seekers in Germany: An empirical study about smartphone usage during the flight

E Steinbrink, L Reichert, M Mende… - Proceedings of the ACM on …, 2021 - dl.acm.org
Since 2015, an increased number of asylum seekers is coming to Europe. These migration
movements increasingly rely on digital infrastructure, such as mobile internet access and …

A fine-grained and lightweight data access control model for mobile cloud computing

S Fugkeaw - IEEE Access, 2020 - ieeexplore.ieee.org
With rapidly increasing adoption of cloud computing and the advancement of today mobile
computing, it is inevitable that mobile devices are used to receive and send the data through …

Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices

B Chang, F Zhang, B Chen, Y Li, WT Zhu… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for
mobile devices that can defend against strong coercive multi-snapshot adversaries, who …