U-PriSM 2: the second usable privacy and security for mobile devices workshop.
Sonia ChiassonHeather CrawfordSerge EgelmanPourang IraniPublished in: Mobile HCI (2013)
Keyphrases
- mobile devices
- security issues
- statistical databases
- security concerns
- security and privacy issues
- preserving privacy
- security risks
- personal data
- privacy preserving
- information security
- data security
- privacy requirements
- security mechanisms
- security threats
- privacy issues
- security properties
- rfid systems
- confidential information
- mobile commerce
- security services
- security measures
- mobile phone
- mobile learning
- personal information
- secure multiparty computation
- data privacy
- privacy concerns
- protection mechanisms
- electronic payment
- security policies
- sensitive data
- privacy preserving data mining
- biometric template
- context aware
- privacy enhancing
- security problems
- privacy preservation
- network security
- individual privacy
- intrusion detection
- identity management
- access control
- authentication protocol
- sensitive information
- location based services
- mobile environments
- mobile computing
- generation algorithm
- security requirements
- private information
- remote server
- privacy protection
- location aware
- trusted third party
- mobile users
- mobile technologies
- security analysis
- learning activities
- mutual authentication
- smart card
- user privacy
- mobile applications
- homomorphic encryption
- encryption scheme