ABSTRACT

Ubiquitous Computing and Its Vulnerability .................................................................475 Embedded Systems ................................................................................................475