Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques.
Lilian Charles MutalemwaSeokjoo ShinPublished in: IEEE Access (2020)
Keyphrases
- privacy protection
- mutual authentication
- trusted third party
- privacy preserving
- information loss
- private information
- data sharing
- personal data
- data collection
- statistical databases
- data anonymization
- data publishing
- statistical disclosure
- location privacy
- sensitive information
- databases
- security protocols
- data sets
- data protection
- privacy guarantees
- relational databases
- anonymized data