Showing 1 - 6 results of 6 for search '"privacy"' Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    ... to people’s lives. However, at the same time user privacy is potentially threatened. This paper shows that a...
    Get full text
    Default Conference proceeding
  5. 5
    ... requirements surrounding personal privacy that may be invaded by continuous monitoring through sensors. Towards...
    Get full text
    Default Conference proceeding
  6. 6
    ... communications, mobile device users are still susceptible to privacy and security risks. In this paper, a novel...
    Get full text
    Default Article