Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Imed El FrayTomasz HylaMiroslaw KurkowskiWitold MackowJerzy PejasPublished in: CSS (2014)
Keyphrases
- sensitive information
- mobile devices
- privacy preservation
- authentication protocol
- privacy preserving
- data protection
- third party
- privacy issues
- sensitive data
- data privacy
- original data
- private information
- confidential information
- smart card
- security analysis
- privacy protection
- privacy preserving data publishing
- data sharing
- data mining
- feature selection
- privacy preserving data mining
- public key
- raw data
- wireless networks
- access control
- nearest neighbor
- protect sensitive