Impact of Emerging Hardware on Security and Privacy.
Trent JaegerBrent ByungHoon KangNele MentensCynthia SturtonPublished in: IEEE Secur. Priv. (2023)
Keyphrases
- security issues
- statistical databases
- security concerns
- information security
- security and privacy issues
- security mechanisms
- data security
- low cost
- security risks
- personal data
- legal issues
- security properties
- preserving privacy
- real time
- privacy preserving
- access control
- privacy concerns
- sensitive data
- confidential information
- privacy issues
- security measures
- data privacy
- security services
- privacy requirements
- electronic payment
- security problems
- data protection
- rfid systems
- identity management
- protection mechanisms
- secure multiparty computation
- random number generator
- hardware and software
- authentication protocol
- security threats
- security policies
- personal information
- sensitive information
- cryptographic protocols
- security management
- privacy preservation
- private information
- privacy enhancing
- individual privacy
- mutual authentication
- protection schemes
- user privacy
- security protocols
- hardware implementation
- data mining
- trusted computing
- privacy policies
- differential privacy
- key management
- biometric template
- network security
- electronic transactions
- electronic commerce
- intrusion detection
- cloud computing