A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment.
Arij Ben AmorMohamed AbidAref MeddebPublished in: AICCSA (2017)
Keyphrases
- privacy preserving
- authentication scheme
- privacy preserving data mining
- privacy preservation
- smart card
- data privacy
- vertically partitioned data
- private information
- multi party
- privacy sensitive
- privacy concerns
- privacy protection
- data mining
- sensitive data
- public key
- secret key
- security analysis
- user authentication
- security requirements
- association rules
- secure multiparty computation
- feature space