{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T01:58:28Z","timestamp":1649037508022},"reference-count":22,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018,11,1]]},"DOI":"10.1587\/transinf.2017icp0017","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T22:46:54Z","timestamp":1541026014000},"page":"2612-2621","source":"Crossref","is-referenced-by-count":1,"title":["A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Yong","family":"JIN","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Masahiko","family":"TOMOISHI","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Satoshi","family":"MATSUURA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Yoshiaki","family":"KITAGUCHI","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Y. Jin, M. Tomoishi, and S. Matsuura, \u201cDesign of a Concealed File System Adapted for Mobile Devices Based on GPS Information,\u201d 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, pp.459-464, 2016. 10.1109\/compsac.2016.93","DOI":"10.1109\/COMPSAC.2016.93"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] Y. Jin, M. Tomoishi, and S. Matsuura, \u201cAn In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations,\u201d 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, pp.608-613, 2017. 10.1109\/compsac.2017.56","DOI":"10.1109\/COMPSAC.2017.56"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Moore, \u201cDetecting Ransomware with Honeypot Techniques,\u201d 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, pp.77-81. 2016. 10.1109\/ccc.2016.14","DOI":"10.1109\/CCC.2016.14"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] N. Scaife, H. Carter, P. Traynor, and K.R.B. Butler, \u201cCryptoLock (and Drop It): Stopping Ransomware Attacks on User Data,\u201d 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, pp.303-312, 2016. 10.1109\/icdcs.2016.46","DOI":"10.1109\/ICDCS.2016.46"},{"key":"5","unstructured":"[5] Advanced Persistent Threats: A Symantec Perspective, https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/white_papers\/b-advanced_persistent_threats_WP_21215957.en-us.pdf (accessed 2017-11-12)."},{"key":"6","unstructured":"[6] 2017 Internet Security Threat Report (online), available from: https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] R. Fielding, Ed and J. Reschke, Ed., \u201cHypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing,\u201d IETF, RFC7230, June 2014.","DOI":"10.17487\/rfc7230"},{"key":"8","unstructured":"[8] Citrix Systems, Inc., \u201cWhat is VDI?,\u201d https:\/\/www.citrix.com\/glossary\/vdi.html (accessed 2017-01-31)."},{"key":"9","unstructured":"[9] TechNet, \u201cOverview of Virtual Private networks (VPN),\u201d https:\/\/technet.microsoft.com\/ja-jp\/library\/bb838946.aspx (accessed 2017-01-31)."},{"key":"10","unstructured":"[10] \u201cWhat is a Zero-Day Vulnerability?,\u201d (online) available from http:\/\/www.pctools.com\/security-news\/zero-day-vulnerability\/"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] S. Vishnupriya, P. Saranya, and A. Rajasri, \u201cSecure multicloud storage with policy based access control and cooperative provable data possession,\u201d International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp.1-6, 2014. doi: 10.1109\/ICICES.2014.7033747 10.1109\/icices.2014.7033747","DOI":"10.1109\/ICICES.2014.7033747"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Maffei, G. Malavolta, M. Reinert, and D. Schr\u00f6der, \u201cPrivacy and Access Control for Outsourced Personal Records,\u201d 2015 IEEE Symposium on Security and Privacy, San Jose, CA, pp.341-358, 2015. doi: 10.1109\/SP.2015.28 10.1109\/sp.2015.28","DOI":"10.1109\/SP.2015.28"},{"key":"13","unstructured":"[13] L. Scott and D. Denning, \u201cLocation Based Encryption &amp; Its Role In Digital Cinema Distribution,\u201d Proceedings of ION GPS\/GNSS, pp.288-297, 2003."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M.S. Abolghasemi, M.M. Sefidab, and R.E. Atani, \u201cUsing location based encryption to improve the security of data access in cloud computing,\u201d International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.261-265, 22-25 Aug. 2013 10.1109\/icacci.2013.6637181","DOI":"10.1109\/ICACCI.2013.6637181"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] R. Karimi and M. Kalantari, \u201cEnhancing security and confidentiality on mobile devices by location-based data encryption,\u201d 17th IEEE International Conference on Networks (ICON), pp.241-245, 14-16 Dec. 2011 10.1109\/icon.2011.6168482","DOI":"10.1109\/ICON.2011.6168482"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] S. Kelly, \u201cSecurity Implications of Using the Data Encryption Standard (DES),\u201d IETF, RFC4772, Dec. 2006.","DOI":"10.17487\/rfc4772"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] E. Rescorla, \u201cDiffie-Hellman Key Agreement Method,\u201d IETF, RFC2631, June 1999.","DOI":"10.17487\/rfc2631"},{"key":"18","unstructured":"[18] National Marine Electronics Association, \u201cNMEA 0183 Standard,\u201d http:\/\/www.nmea.org\/content\/nmea_standards\/nmea_0183_v_410.asp (access 2017-01-31)."},{"key":"19","unstructured":"[19] IDRIX, \u201cVeraCrypt-High Security Disk Encryption,\u201d https:\/\/www.idrix.fr\/Root\/content\/category\/7\/32\/60\/ (accessed 2017-01-31)."},{"key":"20","unstructured":"[20] Crypt::CBC, http:\/\/search.cpan.org\/~lds\/Crypt-CBC\/CBC.pm (accessed 2017-01-31)."},{"key":"21","unstructured":"[21] GlobalSat WorldCom Corporation, \u201cBu-353S4 Cable GPS with USB interface (SiRF Star IV),\u201d http:\/\/usglobalsat.com\/p-688-bu-353-s4.aspx (accessed 2017-01-31)."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] A. Jovanovic, C. Botteron, and P.-A. Farine, \u201cMulti-test detection and protection algorithm against spoofing attacks on GNSS receivers,\u201d IEEE\/ION in Position, Location and Navigation Symposium-PLANS 2014, pp.1258-1271, 5-8 May 2014. 10.1109\/plans.2014.6851501","DOI":"10.1109\/PLANS.2014.6851501"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2017ICP0017\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T08:53:50Z","timestamp":1572425630000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2017ICP0017\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"references-count":22,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017icp0017","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,1]]}}}