Trust but Verify: Cryptographic Data Privacy for Mobility Management.
Matthew TsaoKaidi YangStephen ZoepfMarco PavonePublished in: CoRR (2021)
Keyphrases
- data privacy
- mobility management
- privacy concerns
- privacy preserving
- smart card
- data sharing
- cloud computing
- privacy preserving data mining
- personal information
- multimedia services
- sensitive information
- ip networks
- cellular networks
- data quality
- information security
- sensitive data
- distributed data
- mobile users
- mobile objects
- trust model
- wireless sensor networks
- mobile nodes
- private information
- original data
- key management
- wireless mesh networks
- hash functions
- mobile ad hoc networks
- data mining
- data analysis