Democratic Privacy: A protocol-hidden perturbation scheme for pervasive computing.
Shunsuke AokiKaoru SezakiPublished in: ICC (2016)
Keyphrases
- pervasive computing
- authentication protocol
- mutual authentication
- ambient intelligence
- daily life
- trusted third party
- context aware
- security analysis
- context awareness
- computing environments
- mobile devices
- lightweight
- ubiquitous computing
- service discovery
- pervasive computing environments
- pervasive environments
- mobile computing
- privacy protection
- privacy preserving
- expert systems
- smart environments
- public key
- secret key
- privacy preserving data mining
- artificial intelligence
- smart card
- wireless sensor networks
- database systems