Defeating the Downgrade Attack on Identity Privacy in 5G.
Mohsin KhanPhilip GinzboorgKimmo JärvinenValtteri NiemiPublished in: CoRR (2018)
Keyphrases
- identity management
- individual privacy
- security risks
- trust relationships
- privacy preserving
- personal information
- authentication protocol
- access control
- countermeasures
- privacy preserving data mining
- differential privacy
- privacy protection
- privacy concerns
- security issues
- privacy preservation
- privacy issues
- secret key
- malicious users
- privacy enhancing
- privacy requirements
- privacy policies
- security measures
- preserving privacy
- denial of service attacks
- privacy aware
- data privacy
- dos attacks
- legal issues
- sensitive data
- private information
- abstract argumentation
- statistical databases
- cloud computing