Defeating the Downgrade Attack on Identity Privacy in 5G.
Mohsin KhanPhilip GinzboorgKimmo JärvinenValtteri NiemiPublished in: SSR (2018)
Keyphrases
- identity management
- individual privacy
- personal information
- security risks
- trust relationships
- privacy preserving
- authentication protocol
- information leakage
- privacy aware
- privacy concerns
- access control
- privacy protection
- cloud computing
- security issues
- security measures
- differential privacy
- statistical databases
- security concerns
- data publishing
- malicious users
- privacy enhancing
- private data
- personal data
- privacy preserving data mining
- private information
- information loss
- data privacy
- secret key
- legal issues
- countermeasures
- sensitive information
- database