Privacy-Preserving and Scalable Authentication based on Network Connection Traces.
David MonscheinOliver P. WaldhorstPublished in: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. (2022)
Keyphrases
- privacy preserving
- network connection
- network access
- privacy preserving data mining
- vertically partitioned data
- privacy preservation
- data privacy
- multi party
- horizontally partitioned data
- private information
- privacy sensitive
- privacy issues
- privacy requirements
- data perturbation
- preserving privacy
- scalar product
- differential privacy
- sensitive data
- privacy protection
- wireless networks
- private data
- mobile phone
- privacy concerns
- sensitive information
- homomorphic encryption
- privacy preserving association rule mining
- authentication protocol
- security analysis
- mobile agents
- secure multiparty computation
- cloud computing