Login / Signup
A privacy-aware continuous authentication scheme for proximity-based access control.
Isaac Agudo
Ruben Rios
Javier López
Published in:
Comput. Secur. (2013)
Keyphrases
</>
privacy aware
authentication scheme
personal information
smart card
secret key
user authentication
privacy preservation
public key
security analysis
role based access control
privacy policies
authentication protocol
privacy preserving
fine grained
third party
location based services
location information
data mining