Login / Signup
Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting.
Jeng-Ping Lin
Jih-Ming Fu
Published in:
Int. J. Netw. Secur. (2013)
Keyphrases
</>
privacy protection
privacy preserving
trusted third party
data collection
information loss
private information
data sharing
sensitive information
statistical databases
key agreement protocol
database
data sets
statistical disclosure
data management
security analysis