Learn More
The ubiquitous proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems , users gain access to remote service providers over mobile network operators which are assumed to be trusted and not improperly use or disclose users' information. In this paper, we remove this assumption, offering(More)
  • 1