Keyphrases
- security issues
- information security
- security concerns
- statistical databases
- security services
- security mechanisms
- security and privacy issues
- security risks
- personal data
- data security
- privacy concerns
- privacy issues
- constraint satisfaction problems
- sensitive data
- security requirements
- preserving privacy
- cryptographic protocols
- privacy requirements
- security threats
- security properties
- access control
- encryption algorithms
- public key cryptography
- privacy preserving
- security policies
- confidential information
- security measures
- identity management
- electronic payment
- data privacy
- cellular automata
- personal information
- protection mechanisms
- cryptographic algorithms
- smart card
- privacy enhancing
- secure multiparty computation
- network security
- authentication protocol
- constraint satisfaction
- rfid systems
- individual privacy
- intrusion detection
- privacy protection
- lecture notes in artificial intelligence
- rfid tags
- elliptic curve cryptography
- sensitive information
- privacy policies
- np complete
- public key
- encryption scheme
- private information
- security analysis
- lecture notes
- security protocols
- cloud computing