Guest Editorial: Trust, Security and Privacy of 6G.
Zheng YanLaurence T. YangTieyan LiYoan MicheShui YuStephen S. YauPublished in: IEEE Netw. (2022)
Keyphrases
- privacy concerns
- security services
- security issues
- policy enforcement
- security concerns
- statistical databases
- access control
- trust relationships
- security mechanisms
- personal information
- data security
- information security
- electronic transactions
- personal data
- security and privacy issues
- security properties
- preserving privacy
- data privacy
- sensitive data
- special issue
- access control models
- security management
- privacy preserving
- privacy issues
- security measures
- security requirements
- enterprise network
- security protocols
- rfid systems
- security risks
- privacy requirements
- trusted computing
- security threats
- trust model
- electronic payment
- confidential information
- security policies
- trust management
- public key infrastructure
- protection mechanisms
- privacy enhancing
- identity management
- secure multiparty computation
- electronic commerce
- individual privacy
- trust negotiation
- intrusion detection
- security analysis
- malicious nodes
- mutual authentication
- biometric template
- cloud computing
- authentication protocol
- privacy policies
- key management
- third party
- sensitive information
- social awareness
- peer to peer
- data protection
- cryptographic protocols
- rfid technology
- differential privacy
- privacy preservation
- privacy preserving data mining
- public key
- smart card
- data sharing