An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications.
Jung-Yoon KimHyoung-Kee ChoiJohn A. CopelandPublished in: VTC Fall (2010)
Keyphrases
- authentication scheme
- privacy preservation
- smart card
- sensitive data
- data privacy
- user authentication
- privacy preserving
- security flaws
- authentication protocol
- privacy requirements
- secret key
- sensitive information
- privacy preserving data mining
- security analysis
- data mining
- public key
- key management
- data quality
- information security
- security requirements
- privacy protection
- access control
- data sharing
- data mining applications
- data sets