Login / Signup
A new approach to mitigating security risks of phone clone co-location over mobile clouds.
Seyed Yahya Vaezpour
Rui Zhang
Kui Wu
Jianping Wang
Gholamali C. Shoja
Published in:
J. Netw. Comput. Appl. (2016)
Keyphrases
</>
security risks
mobile phone
mobile devices
security threats
mobile objects
mobile applications
mobility patterns
mobile environments
mobile users
mobile phone users
location information
information security
cloud computing
location based services
context aware
email
security issues
database
data mining