A novel authentication and authorization scheme in P2P networking using location-based privacy.
B. N. JagdaleJagdish W. BakalPublished in: Evol. Intell. (2022)
Keyphrases
- peer to peer
- authentication protocol
- trust relationships
- access control
- identity management
- rights management
- authentication scheme
- mutual authentication
- security analysis
- security mechanisms
- security requirements
- trusted third party
- trust management
- fine grained
- authentication mechanism
- privacy policies
- distributed computing
- secret image sharing
- key distribution
- personal information
- social networking
- privacy aware
- image authentication
- data security
- secret key
- security issues
- user authentication
- ad hoc networks
- smart card
- rfid tags
- sensitive information
- trust negotiation