Using trusted computing for privacy preserving keystroke-based authentication in smartphones.
Mohammad NaumanTamleek AliAzhar RaufPublished in: Telecommun. Syst. (2013)
Keyphrases
- privacy preserving
- trusted computing
- trusted platform module
- keystroke dynamics
- user authentication
- privacy preserving data mining
- computing environments
- vertically partitioned data
- computing platform
- cloud computing
- privacy preservation
- mobile devices
- computer security
- multi party
- privacy concerns
- privacy protection
- virtual organization
- private information
- sensitive information
- mobile applications
- sensitive data
- data privacy
- differential privacy
- secure multiparty computation
- security analysis
- database
- low cost