Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
Wenrui DiaoRui LiuXiangyu LiuZhe ZhouZhou LiKehuan ZhangPublished in: J. Comput. Secur. (2018)
Keyphrases
- mobile users
- context aware
- security risks
- mobile phone
- mobile computing
- data publishing
- mobile environments
- mobile networks
- mobile devices
- privacy preserving
- location based services
- user mobility
- location dependent
- user preferences
- mobile agents
- base station
- mobile applications
- user context
- privacy protection
- mobile commerce
- cryptographic protocols
- user profiles
- information sources
- mobile services
- security mechanisms
- location management
- biometric template