Report - Protocol for a Systematic Literature Review on Security ... · These are pervasive computing, mobile computing and wearable computing. The choice of the additional terms can be justi

Please pass captcha verification before submit form