TwoKind authentication: protecting private information in untrustworthy environments.
Katelin BaileyApu KapadiaLinden VongsathornSean W. SmithPublished in: WPES (2008)
Keyphrases
- private information
- privacy preservation
- privacy preserving
- personal information
- privacy issues
- privacy protection
- third party
- private data
- privacy concerns
- confidential data
- privacy violations
- individual privacy
- preserving privacy
- sensitive information
- identity management
- cloud computing
- privacy requirements
- privacy breaches