Obscuring users' identity in VoIP/IMS environments.
Nikos VrakasDimitris GeneiatakisCostas LambrinoudakisPublished in: Comput. Secur. (2014)
Keyphrases
- end users
- web environment
- real world
- information sources
- dynamic environments
- information seeking
- social context
- physical world
- social networking sites
- network architecture
- identity management
- user generated content
- information overload
- recommendation systems
- daily life
- user profiles
- collaborative filtering
- social media