How to Exploit 5G Networks for IoT e-Health Security and Privacy Challenges.
Bakkiam David DeebakFadi M. Al-TurjmanPublished in: IEEE Internet Things Mag. (2021)
Keyphrases
- security issues
- security problems
- security concerns
- privacy enhancing
- security and privacy issues
- enterprise network
- data security
- computer networks
- rfid systems
- security mechanisms
- privacy issues
- cloud computing
- security threats
- statistical databases
- security requirements
- information security
- personal information
- privacy concerns
- security policies
- data privacy
- sensitive data
- preserving privacy
- privacy preserving
- access control
- key management
- privacy requirements
- social networks
- network security
- security risks
- security services
- cyber security
- electronic payment
- secure multiparty computation
- protection mechanisms
- personal data
- privacy preservation
- smart card
- user privacy
- security measures
- confidential information
- identity management
- security properties
- resource constrained
- privacy protection
- rfid tags
- sensitive information
- management system