Keyphrases
- mobile devices
- security issues
- selected papers
- international workshop
- lecture notes
- acm sigkdd
- statistical databases
- naacl hlt
- international conference
- security concerns
- preserving privacy
- mobile commerce
- cyber security and information intelligence
- personal data
- workshop on artificial intelligence
- security and privacy issues
- privacy issues
- data security
- secure multiparty computation
- information security
- sensitive data
- privacy concerns
- mobile applications
- mobile learning
- privacy preserving
- context aware
- knowledge discovery and data mining
- security properties
- computer science
- smart phones
- user privacy
- security measures
- security risks
- location based services
- security mechanisms
- mobile phone
- acm sigmod
- desktop computers
- international symposium
- rfid systems
- privacy requirements
- security services
- security threats
- access control
- tablet computers
- student research workshop
- data privacy
- security policies
- intrusion detection
- electronic payment
- personal information
- authentication protocol
- human computation
- mobile users
- confidential information
- privacy protection
- privacy preserving data mining
- remote server
- mobile technologies
- identity management
- security requirements
- embedded devices
- program committee
- biometric template
- sensitive information
- database security
- security protocols
- computational intelligence
- cloud computing
- private information
- lecture notes in artificial intelligence