Identity leakage mitigation on asymmetric secure sketch.
Chengfang FangQiming LiEe-Chien ChangPublished in: IJCB (2011)
Keyphrases
- identity management
- information leakage
- cloud computing
- risk management
- access control
- highly efficient
- sketch recognition
- security requirements
- lightweight
- security issues
- sensitive data
- stream cipher
- cryptographic protocols
- primal sketch
- diffie hellman
- security architecture
- security management
- key management
- personal information