Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication.
Adam J. AvivRavi KuberPublished in: CoRR (2018)
Keyphrases
- security mechanisms
- security issues
- authentication protocol
- identity management
- security services
- electronic payment
- biometric template
- security requirements
- security concerns
- statistical databases
- security properties
- mutual authentication
- security analysis
- user authentication
- security threats
- information security
- smart card
- authentication mechanism
- identity authentication
- access control
- personal information
- fuzzy vault
- security protocols
- preserving privacy
- security risks
- trusted third party
- security and privacy issues
- integrity verification
- data encryption
- security systems
- data security
- encryption decryption
- personal data
- security measures
- privacy preserving
- sensitive data
- rfid systems
- data privacy
- privacy requirements
- attitudes toward
- security policies
- cloud computing
- secure multiparty computation
- biometric authentication
- data protection
- privacy issues
- public key
- rfid tags
- user privacy
- trust relationships
- authentication scheme
- confidential information
- cryptographic protocols
- privacy preserving data mining
- privacy concerns
- private information
- privacy enhancing
- virtual private network
- factor authentication
- information loss
- differential privacy
- public key infrastructure