How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Michal KepkowskiLucjan HanzlikIan D. WoodMohamed Ali KâafarPublished in: Proc. Priv. Enhancing Technol. (2022)
Keyphrases
- security risks
- data publishing
- security mechanisms
- authentication protocol
- countermeasures
- protection mechanisms
- cryptographic protocols
- security threats
- privacy preserving
- personal information
- private information
- malicious users
- security issues
- privacy preservation
- biometric template
- secret key
- privacy preserving data mining
- security protocols
- data mining
- privacy issues
- privacy concerns
- statistical databases
- information loss
- network security
- location privacy
- information security
- smart card
- social networks