Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Sonia ChiassonHeather CrawfordSerge EgelmanPourang IraniPublished in: Int. J. Mob. Hum. Comput. Interact. (2014)
Keyphrases
- mobile devices
- security issues
- statistical databases
- security concerns
- security mechanisms
- security and privacy issues
- privacy preserving
- privacy requirements
- sensitive data
- personal data
- privacy issues
- security measures
- data security
- information security
- preserving privacy
- secure multiparty computation
- mobile phone
- data privacy
- security threats
- personal information
- security risks
- security services
- security policies
- security properties
- security requirements
- privacy concerns
- access control
- rfid systems
- confidential information
- security management
- identity management
- security problems
- biometric template
- mobile commerce
- individual privacy
- privacy preserving data mining
- context aware
- network security
- location based services
- protection mechanisms
- mobile learning
- smart phones
- remote server
- privacy enhancing
- intrusion detection
- private information
- electronic payment
- cyber security
- security protocols
- privacy preservation
- key management
- location aware
- generation algorithm
- authentication protocol
- mobile environments
- cryptographic protocols
- privacy protection
- learning activities
- outsourced databases