A Privacy-Preserving V2I Authentication Scheme Without Certificates.
Hao-Hao NieYan-Ping LiQian-Hong WuPublished in: J. Inf. Sci. Eng. (2017)
Keyphrases
- authentication scheme
- privacy preserving
- public key
- privacy preserving data mining
- secret key
- security analysis
- vertically partitioned data
- multi party
- privacy sensitive
- privacy preservation
- smart card
- user authentication
- data privacy
- authentication protocol
- sensitive information
- private information
- privacy concerns
- secure multiparty computation
- digital signature
- sensitive data
- horizontally partitioned data
- signature scheme
- privacy protection
- access control
- differential privacy
- encryption scheme
- databases
- medical data
- data quality
- scalar product
- data mining techniques
- distributed systems
- feature space