Maintaining source privacy under eavesdropping and node compromise attacks.
Kanthakumar PongaliurLi XiaoPublished in: INFOCOM (2011)
Keyphrases
- security risks
- data publishing
- security mechanisms
- privacy preserving
- protection mechanisms
- malicious nodes
- security threats
- security issues
- private information
- trade off
- sensitive information
- biometric template
- cryptographic protocols
- destination node
- black hole
- malicious attacks
- identity management
- graph structure
- malicious users
- tree structure
- directed graph
- personal information
- differential privacy
- privacy concerns
- countermeasures
- security measures
- source node
- information leakage
- private data
- information loss
- sensitive data