Login / Signup
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols.
Ankush Balaram Pawar
Shashikant U. Ghumbre
Rashmi M. Jogdand
Published in:
Int. J. Inf. Secur. Priv. (2022)
Keyphrases
</>
privacy preservation
data sets
data quality
data analysis
data sources
data mining applications
data collection
data mining algorithms
data distribution
raw data
sensitive information
data privacy
sensitive data
privacy requirements