Abstract

Developments in pervasive computing trigger a need to rethink security and privacy mechanisms. At the same time, security and privacy methods and systems can likewise benefit from the proliferation of pervasive computing technology, making novel approaches possible. In light of these exciting changes, beginning with this introductory column, IEEE Pervasive Computing introduces a new Security and Privacy Department in which I will invite columns on new developments and topics.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call