Login / Signup
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.
Frank Stajano
Published in:
ISSS (2002)
Keyphrases
</>
pervasive computing
intrusion detection
access control
security policies
multi agent
data streams
ambient intelligence