When encryption is not enough: privacy attacks in content-centric networking.
Cesar GhaliGene TsudikChristopher A. WoodPublished in: ICN (2017)
Keyphrases
- security risks
- cryptographic protocols
- data publishing
- security mechanisms
- security properties
- peer to peer
- privacy preserving
- protection mechanisms
- encryption scheme
- key management
- intrusion prevention
- multimedia
- cryptographic algorithms
- biometric template
- security threats
- security protocols
- countermeasures
- personal information
- privacy preservation
- privacy protection
- information leakage
- stream cipher
- data confidentiality
- private information
- network security