Return to Article Details Personal Information Management Security from Tamper in a Liquid Surveillance Environment Download Download PDF