[1]
V. M. Santana and P. Centonze, “SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS”, IJCT, vol. 15, no. 8, pp. 7008–7020, May 2016.