Login / Signup
Subverting MAC: How authentication in mobile environment can be undermined.
Fatema Al Mansoori
Joonsang Baek
Khaled Salah
Published in:
INFOCOM Workshops (2016)
Keyphrases
</>
mobile environments
mobile devices
context aware
mobile users
mobile agents
location dependent
mobile applications
mobile computing
mobile objects
computing environments
location based services
mobile networks
mobile phone
query processing