Developments in pervasive computing trigger a need to rethink security and privacy mechanisms. At the same time, security and privacy methods and systems can likewise benefit from the proliferation of… Click to show full abstract
Developments in pervasive computing trigger a need to rethink security and privacy mechanisms. At the same time, security and privacy methods and systems can likewise benefit from the proliferation of pervasive computing technology, making novel approaches possible. In light of these exciting changes, beginning with this introductory column, IEEE Pervasive Computing introduces a new Security and Privacy Department in which I will invite columns on new developments and topics.
               
Click one of the above tabs to view related content.