Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Xi Jun LinLin SunHaipeng QuPublished in: Comput. Secur. (2015)
Keyphrases
- privacy preserving
- privacy preserving data mining
- vertically partitioned data
- privacy preservation
- data privacy
- multi party
- preserving privacy
- differential privacy
- horizontally partitioned
- privacy concerns
- privacy protection
- privacy preserving classification
- scalar product
- sensitive data
- record linkage
- cloud computing
- privacy sensitive
- secure multiparty computation
- homomorphic encryption
- horizontally partitioned data
- personal data
- private data
- decision trees
- private information
- sensitive information
- management system
- privacy guarantees
- privacy requirements
- data transformation
- privacy issues
- security mechanisms
- third party
- peer to peer