Authenticating with privacy protection in opportunistic networks.
Ming-Huang GuoHorng-Twu LiawMeng-Yu ChiuLi-Ping TsaiPublished in: QSHINE (2015)
Keyphrases
- privacy protection
- privacy preserving
- information loss
- data collection
- personal data
- statistical databases
- private information
- data anonymization
- data sharing
- sensitive information
- social networks
- privacy preservation
- data protection
- network structure
- privacy policies
- location privacy
- statistical disclosure
- data publishing
- trusted third party
- anonymized data