• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Shadow attacks on users' anonymity in pervasive computing environments.

Daniele RiboniLinda PareschiClaudio Bettini
Published in: Pervasive Mob. Comput. (2008)
Keyphrases
  • malicious users
  • pervasive computing environments
  • security risks
  • user interaction
  • end users
  • artificial intelligence
  • recommender systems
  • computational intelligence