Anonymous authentication for mobile Single Sign-On to protect user privacy.
Kalid ElmuftiDasun WeerasingheMuttukrishnan RajarajanVeselin RakocevicPublished in: Int. J. Mob. Commun. (2008)
Keyphrases
- user privacy
- factor authentication
- identity management
- privacy preserving
- malicious users
- authentication protocol
- privacy preservation
- mobile devices
- mobile terminals
- private information
- location based services
- access control
- trusted platform module
- mobile applications
- mobile phone
- personal information
- user centric
- user authentication
- authentication systems
- sensitive information
- privacy protection
- computing environments
- data mining applications
- user experience
- data encryption
- peer to peer
- query processing