Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones.
Chiara GaldiMichele NappiJean-Luc DugelayYong YuPublished in: IEEE Commun. Mag. (2018)
Keyphrases
- sensitive data
- authentication protocol
- smart card
- protection mechanisms
- information security
- data confidentiality
- data protection
- privacy protection
- security analysis
- data privacy
- confidential data
- secret key
- security requirements
- data storage
- data sharing
- sensitive information
- privacy preserving
- security mechanisms
- personal data
- security issues
- rfid tags
- network security
- data structure
- database
- intrusion detection
- database management systems