Login / Signup
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Feng Zhu
Sandra Carpenter
Wei Zhu
Matt W. Mutka
Published in:
Int. J. Inf. Secur. Priv. (2010)
Keyphrases
</>
pervasive computing environments
computing environments
service discovery
pervasive computing
management system
databases
web services
language model
data management
petri net
incomplete information
context awareness
automated negotiation