Authentication and Its Privacy Effects.
Lynette I. MillettStephen H. HoldenPublished in: IEEE Internet Comput. (2003)
Keyphrases
- identity management
- authentication protocol
- privacy preserving
- security mechanisms
- personal information
- privacy aware
- personal data
- lightweight
- information loss
- electronic payment
- location privacy
- privacy concerns
- security requirements
- digital images
- authentication scheme
- trusted third party
- legal issues
- security analysis
- mutual authentication
- biometric template
- biometric authentication
- private data
- privacy preserving data mining
- security issues
- private information
- cloud computing