Game theoretical analysis of usable security and privacy.
Cynara JustineRendhir R. PrasadCiza ThomasPublished in: Secur. Priv. (2021)
Keyphrases
- theoretical analysis
- security issues
- statistical databases
- security concerns
- personal data
- data security
- privacy requirements
- preserving privacy
- security risks
- security mechanisms
- security and privacy issues
- sensitive data
- security measures
- security properties
- privacy issues
- privacy preserving
- information security
- confidential information
- rfid systems
- privacy preservation
- access control
- personal information
- game theory
- data privacy
- privacy enhancing
- computer games
- identity management
- secure multiparty computation
- security policies
- privacy concerns
- security requirements
- biometric template
- protection mechanisms
- security services
- security problems
- nash equilibrium
- game playing
- electronic payment
- security threats
- private information
- authentication protocol
- intrusion detection
- user privacy
- security management
- cryptographic protocols
- cloud computing
- individual privacy
- service providers
- security protocols
- third party
- game theoretic
- sensitive information
- outsourced databases
- encryption key
- mutual authentication
- trusted third party
- cyber security
- differential privacy
- rfid tags
- game play
- serious games
- educational games
- video games
- virtual world