New directions in IoT privacy using attribute-based authentication.
Gergely AlpárLejla BatinaLynn Margaret BattenVeelasha MoonsamyAnna KrasnovaAntoine GuellierIynkaran NatgunanathanPublished in: Conf. Computing Frontiers (2016)
Keyphrases
- identity management
- authentication protocol
- cloud computing
- security mechanisms
- electronic payment
- personal information
- rfid systems
- privacy preserving
- security issues
- mutual authentication
- trusted third party
- security services
- security problems
- management system
- access control
- privacy issues
- private data
- differential privacy
- biometric authentication
- privacy concerns
- biometric template
- fragile watermarking
- key management
- privacy protection
- personal data
- smart card
- sensitive information
- image authentication
- privacy preserving data mining
- authentication scheme
- security analysis
- public key
- security requirements
- key distribution
- private information
- security risks
- data privacy
- palmprint
- big data
- smart objects
- authentication mechanism
- factor authentication
- electronic commerce