Keyphrases
- mobile devices
- cyber security and information intelligence
- acm conference
- security issues
- security concerns
- statistical databases
- selected papers
- data security
- smart phones
- security mechanisms
- lecture notes
- privacy issues
- international workshop
- preserving privacy
- personal data
- security properties
- acm sigkdd
- security and privacy issues
- international conference
- computational molecular biology
- intelligence gathering
- mobile learning
- security requirements
- rfid systems
- security risks
- privacy requirements
- sensitive data
- mobile phone
- mobile applications
- context aware
- confidential information
- privacy preserving
- biometric template
- security policies
- researchers and practitioners
- electronic payment
- personal information
- security measures
- privacy concerns
- desktop computers
- tablet computers
- naacl hlt
- information security
- data privacy
- interoperability and smart interactions
- access control
- mobile users
- authentication protocol
- outsourced databases
- workshop on artificial intelligence
- private information
- security threats
- invited talk
- australasian database conference
- location based services
- computer science
- cloud computing
- knowledge discovery and data mining
- international symposium
- keynote address
- security protocols
- information explosion
- database security