Login / Signup
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol.
Aydin Aysu
Ege Gulcan
Daisuke Moriyama
Patrick Schaumont
Moti Yung
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
end to end
privacy preserving
vertically partitioned data
privacy preservation
authentication protocol
privacy preserving data mining
ad hoc networks
wireless sensor networks
energy consumption
multipath
sensitive information
privacy protection
secure multiparty computation