Protecting Privacy of BLE Device Users.
Kassem FawazKyu-Han KimKang G. ShinPublished in: USENIX Security Symposium (2016)
Keyphrases
- personal data
- user interaction
- privacy preserving
- privacy preservation
- user centric
- recommender systems
- end users
- protection mechanisms
- user privacy
- multiple users
- sensitive information
- privacy issues
- social network sites
- information overload
- privacy preserving data mining
- personal information
- information seeking
- user experience
- information sources
- access control