Privacy-Preserving Graph Operations for Mobile Authentication
نویسندگان
چکیده
منابع مشابه
Privacy-Preserving Speaker Authentication
Speaker authentication systems require access to the voice of the user. A person’s voice carries information about their gender, nationality etc., all of which become accessible to the system, which could abuse this knowledge. The system also stores users’ voice prints – these may be stolen and used to impersonate the users elsewhere. It is therefore important to develop privacy preserving voic...
متن کاملPrivacy-Preserving Implicit Authentication
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on the server and is used to authenticate an access request originated from the device at a later time. An access reques...
متن کاملPrivacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private input multiset. In order to protect these private sets, the players perform privacy-preserving computation; that is, no party learns more information about other parties’ private input sets than what can be deduced from t...
متن کاملPrivacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
This article introduces a new transaction protocol using mobile agents in electronic commerce. The authors first propose a new model for transactions in electronic commerce, mutual authenticated transactions using mobile agents. They then design a new protocol by this model. Furthermore, the authors analyse the new protocol in terms of authentication, construction, and privacy. The aim of the p...
متن کاملAuthentication and payment protocol preserving location privacy in mobile IP
Mobile IP enables a mobile node (MN) to move around without losing their transport-layer connectivity by using resources in a foreign domain network. Mobile IP (MIP) is expected to be the core infrastructure of future mobile communication, but two services must be provided before the wide deployment of MIP. One is to provide secure communication and the other is to make payment. Security servic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2020
ISSN: 1530-8677,1530-8669
DOI: 10.1155/2020/8859213