Login / Signup
Reconciling user privacy and implicit authentication for mobile devices.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
Nashad Ahmed Safa
Published in:
Comput. Secur. (2015)
Keyphrases
</>
user privacy
mobile devices
identity management
location based services
privacy preserving
malicious users
context aware
access control
mobile phone
mobile applications
mobile users
cloud computing
user centric
personal information
private information
privacy preservation
road network
knowledge discovery
databases