Login / Signup
Inside the Identity Management Game.
Lucy Lynch
Published in:
IEEE Internet Comput. (2011)
Keyphrases
</>
identity management
access control
personal information
cloud computing
game theory
computer games
user centric
game playing
game play
video games
nash equilibrium
trade off
game theoretic
mobile devices
third party
user privacy