Login / Signup
Security in Pervasive Applications: A Survey.
Chiara Bodei
Pierpaolo Degano
Letterio Galletta
Gianluca Mezzetti
GianLuigi Ferrari
Published in:
Eur. J. Law Technol. (2013)
Keyphrases
</>
security issues
network security
information security
security requirements
access control
context aware
intrusion detection
security policies
information assurance
real time
security protocols
computer security
security mechanisms
risk assessment
artificial intelligence
biometric systems
network management
key management
data integrity
data security
user authentication
security properties
security problems
high security
key agreement protocol
neural network