Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Ankush SinglaSyed Rafiul HussainOmar ChowdhuryElisa BertinoNinghui LiPublished in: Proc. Priv. Enhancing Technol. (2020)
Keyphrases
- protection mechanisms
- security protocols
- cryptographic protocols
- security mechanisms
- sensitive data
- security services
- security properties
- personal data
- security risks
- secure multiparty computation
- privacy preservation
- privacy preserving
- security threats
- security issues
- authentication protocol
- access control
- security measures
- privacy issues
- security concerns
- information security
- biometric template
- rfid systems
- personal information
- security vulnerabilities
- security requirements
- statistical databases
- unauthorized access
- mutual authentication
- inference control
- security problems
- malicious users
- privacy protection
- cyber attacks
- private information retrieval
- resource constrained
- semi honest
- privacy preserving data mining
- data publishing
- security policies
- sensitive information
- data security
- security flaws
- homomorphic encryption
- trusted third party
- diffie hellman
- security analysis
- key management
- data privacy
- privacy concerns
- operating system
- key agreement protocol
- privacy requirements
- denial of service attacks
- data protection
- private information
- information loss
- third party