Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics.
Saiyma SarminNafisa AnzumKazi Hasan ZubaerFarzana RahmanA. B. M. Alim Al IslamPublished in: MobiQuitous (2018)
Keyphrases
- sensitive information
- third party
- privacy preserving
- privacy preservation
- private data
- data privacy
- original data
- confidential information
- privacy protection
- cloud computing
- private information
- database systems
- privacy issues
- image processing
- data management
- medical records
- data analysis
- decision trees
- data protection