Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols.
Christopher A. WoodPublished in: ANRW (2023)
Keyphrases
- secure multiparty computation
- privacy preserving
- security properties
- security services
- authentication protocol
- security issues
- cryptographic protocols
- security protocols
- security concerns
- statistical databases
- mutual authentication
- security mechanisms
- security analysis
- semi honest
- security requirements
- homomorphic encryption
- trusted third party
- personal information
- personal data
- preserving privacy
- data privacy
- privacy issues
- security threats
- privacy concerns
- security risks
- privacy preserving data mining
- sensitive data
- data security
- identity management
- security measures
- privacy protection
- communication protocols
- sensitive information
- security and privacy issues
- rfid tags
- key exchange
- rfid systems
- information security
- access control
- smart card
- intrusion detection
- key management
- privacy preservation
- private information
- security problems
- fuzzy connectedness
- privacy enhancing
- biometric template
- key distribution
- key agreement protocol
- data sharing
- security policies
- privacy requirements
- working group
- confidential information
- image segmentation
- diffie hellman
- privacy policies
- key establishment
- third party
- security management
- encryption scheme