Privacy-Preserving Graph Operations for Mobile Authentication
Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power,...
Main Authors: | Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2020/8859213 |
Similar Items
-
Privacy-Enhancing <i>k</i>-Nearest Neighbors Search over Mobile Social Networks
by: Yuxi Li, et al.
Published: (2021-06-01) -
Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data
by: Shiyue Qin, et al.
Published: (2020-01-01) -
Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT
by: Yanan Chen, et al.
Published: (2019-01-01) -
Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications
by: Zongye Zhang, et al.
Published: (2020-01-01) -
Lightweight Privacy-Preserving Equality Query in Edge Computing
by: Qiyu Wu, et al.
Published: (2019-01-01)