Login / Signup

Trust Based Privacy Protection Method in Pervasive Computing.

Feng GaoJingsha HeShunan Ma
Published in: J. Networks (2012)
Keyphrases
  • machine learning
  • information loss
  • privacy protection
  • database
  • artificial intelligence
  • computational intelligence
  • low cost
  • pervasive computing