Home Wireless Security and Privacy: A Practical Protocol Mixing.
David González-TarragóPublished in: AICT (2010)
Keyphrases
- rfid systems
- secure multiparty computation
- authentication protocol
- cryptographic protocols
- security properties
- mutual authentication
- privacy preserving
- homomorphic encryption
- security issues
- security protocols
- semi honest
- physical layer
- security analysis
- security concerns
- wireless local area network
- statistical databases
- security requirements
- security services
- medium access control
- trusted third party
- remote control
- wireless communication
- data security
- lightweight
- security mechanisms
- information security
- wireless networks
- rfid tags
- security model
- privacy issues
- security policies
- user privacy
- security risks
- diffie hellman
- mobile devices
- protocol stack
- electronic transactions
- ad hoc networking
- personal data
- medical devices
- access control
- privacy protection
- privacy concerns
- sensitive data
- secret key
- privacy preserving data mining
- key agreement protocol
- data privacy
- key management
- internet access
- identity management
- mac protocol
- mobile nodes
- rfid technology
- security and privacy issues
- mobility management
- network layer
- mobile users
- smart card