{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:08:53Z","timestamp":1759133333826,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":2,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1536112"],"award-info":[{"award-number":["U1536112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Grand Fundamental Research 973 Program of China","award":["2013CB329102"],"award-info":[{"award-number":["2013CB329102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210803","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"511-511","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["TrustGyges"],"prefix":"10.1145","author":[{"given":"Wendi","family":"Feng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, PRC"}]},{"given":"Chuanchang","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, PRC"}]},{"given":"Bingfei","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, PRC"}]},{"given":"Bo","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, PRC"}]},{"given":"Junliang","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, PRC"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081349"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Hong S. Liu C. Ren B. Huang Y. and Chen J. Personal privacy protection framework based on hidden technology for smartphones. IEEE Access (2017).  Hong S. Liu C. Ren B. Huang Y. and Chen J. Personal privacy protection framework based on hidden technology for smartphones. IEEE Access (2017).","DOI":"10.1109\/ACCESS.2017.2695561"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Munich Germany","acronym":"MobiSys '18"},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210803"}},"subtitle":["A Hidden Volume Solution with Cloud Safe Storage and TEE"],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":2,"alternative-id":["10.1145\/3210240.3210803","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210803","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}