Return to Article Details Dissecting the Security and Protection Issues in Pervasive Computing Download Download PDF