1. Bose, A., Shin, K.G.: Proactive security for mobile messaging networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006, pp. 95–104. ACM, New York (2006).
http://doi.acm.org/10.1145/1161289.1161307
2. Chen, G., Kotz, D., et al.: A survey of context-aware mobile computing research. Technical report, Technical Report TR2000-381, Department of Computer Science, Dartmouth College (2000)
3. Khan, W., Xiang, Y., Aalsalem, M., Arshad, Q.: Mobile phone sensing systems: a survey. IEEE Commun. Surv. Tutorials 15(1), 402–427 (2013)
4. La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446–471 (2013)
5. Marsh, S.: Comfort zones: location dependent trust and regret management for mobile devices. In: Proceedings of LocationTrust (2010)