How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Michal KepkowskiLucjan HanzlikIan D. WoodMohamed Ali KâafarPublished in: CoRR (2022)
Keyphrases
- security risks
- security mechanisms
- data publishing
- personal information
- security issues
- privacy preserving
- protection mechanisms
- authentication protocol
- countermeasures
- private data
- security threats
- malicious attacks
- information leakage
- privacy concerns
- biometric template
- watermarking scheme
- personal data
- malicious users
- security protocols
- sensitive information
- information loss
- digital images
- differential privacy
- privacy preservation
- resource constrained