Login / Signup
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol.
Aydin Aysu
Ege Gulcan
Daisuke Moriyama
Patrick Schaumont
Moti Yung
Published in:
CHES (2015)
Keyphrases
</>
end to end
privacy preserving
privacy preserving data mining
authentication protocol
privacy preservation
vertically partitioned data
private information
ad hoc networks
privacy protection
privacy concerns
feature space
mobile devices
image compression
information sharing
sensitive information
data privacy