Login / Signup

The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.

Bo-heung ChungMin-ho HanKi-young Kim
Published in: FGIT-SecTech (2009)
Keyphrases
  • sensitive information
  • privacy preservation
  • mobile devices
  • third party
  • privacy preserving
  • data mining
  • machine learning
  • face recognition
  • learning activities
  • information sharing
  • private data