Is there a tradeoff between privacy and security in BLE-based IoT applications: Using a smart vehicle of a major Taiwanese brand as example.
Shi-Cho ChaChen-Yu DaiJyun-Fu ChenPublished in: GCCE (2016)
Keyphrases
- security issues
- security problems
- rfid systems
- statistical databases
- security concerns
- smart grid
- security properties
- security mechanisms
- data security
- information security
- privacy issues
- personal data
- security threats
- security risks
- security services
- privacy preserving
- security measures
- key management
- smart objects
- preserving privacy
- privacy concerns
- security and privacy issues
- data privacy
- sensitive data
- security requirements
- privacy enhancing
- cloud computing
- intrusion detection
- language learning
- confidential information
- authentication protocol
- cyber security
- management system
- privacy requirements
- security policies
- secure multiparty computation
- electronic payment
- context aware
- private information
- cryptographic protocols
- pedestrian detection
- network security
- identity management
- security management
- protection mechanisms
- biometric template
- homomorphic encryption
- smart home
- sensitive information
- security protocols
- rfid tags
- cooperative learning
- privacy protection
- security analysis
- outsourced databases
- individual privacy
- user privacy
- resource constrained
- big data
- access control
- data management