-
41
Date Attachable Offline Electronic Cash Scheme
Published 2014-01-01“…It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. …”
Get full text
Article -
42
Privacy preservation in data intensive environment
Published 2018-04-01“…After that we have used two methods K-anonymity and fuzzy system for providing the privacy on medical databases in data intensive enviroments. …”
Get full text
Article -
43
Certain Aspects of the Analysis of Cryptocurrency Transactions during the Prevention and Investigation of Crimes
Published 2021-03-01“…The mechanism of its issuance of guaranteeing pseudo-anonymity while working with cryptocurrency has been outlined. …”
Get full text
Article -
44
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…By adding two blinding factors, the anonymity of users is protected. The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. …”
Get full text
Article -
45
Nuove forme di ‘angoscia territoriale’: il caso Viggiano. Strategie culturali di un territorio in crisi
Published 2020-06-01“…Since the beginning of the last century, Viggiano has shifted from the typical anonymity of a small reality of Southern Italy to the heart of national political events and global economic choices that have elected it the "oil capital of Italy". …”
Get full text
Article -
46
InTEIrviews: An ODD for Qualitative Interviews in the Humanities
Published 2024-04-01“…This ODD is designed to help describe the actual development of the interview, transcribe the interpretations made by the researcher(s), and tackle ethical or anonymity issues.…”
Get full text
Article -
47
FILOSOFAVIMAS KAIP PASIRUOŠIMAS MIRČIAI
Published 2004-01-01“…It is shown that because of his anonymity Greek philosopher can not privatize the content of his thinking. …”
Get full text
Article -
48
Autoportraits photographiques américains : De la blancheur à l’ombre chez Alfred Stieglitz ; de la nudité au pastiche chez Lee Miller
Published 2013-12-01“…Shadows in Lake (1916) corresponds to Stieglitz’s return to anonymity and privacy. In a radically different use of overexposure, Neck manifests Lee Miller’s break with her mentor and her wish to control the images of her overexposed nudity. …”
Get full text
Article -
49
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment
Published 2016-07-01“…In this paper, we propose a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.…”
Get full text
Article -
50
"There’d always be something left" : (im)matérialité de la ville dans Hughie de Eugene O’Neill
Published 2009-12-01“…The city is characterized by emptiness and anonymity. The scenery of the play only emphasizes the vacuity of the two characters’ existence. …”
Get full text
Article -
51
Invalidating Factorial Survey Experiments Using Invalid Comparisons Is Bad Practice: Learning from Forster and Neugebauer (2024)
Published 2025-01-01“…., testing, instrumentation, and conditions of anonymity). In the current article, I discuss each of these major design differences and explain why it invalidates Forster and Neugebauer's (2024) comparison of their FE and FS findings. …”
Get full text
Article -
52
Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks
Published 2018-01-01“…To preserve location privacy of sensors, we use anonymity method to confuse adversaries. To protect the sensitive data, we use prefix membership verification method to prevent adversaries from gaining sensitive messages collected by sensor nodes. …”
Get full text
Article -
53
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
54
Synthetic Browsing Histories for 50 Countries Worldwide: Datasets for Research, Development, and Education
Published 2025-01-01“…Research shows that anonymized histories can lead to re-identification, nullifying the anonymity promised by informed consent. …”
Get full text
Article -
55
Les services de Santé Sexuelle et Reproductive en Tunisie. Résultats d’une recherche qualitative auprès des jeunes usagers
Published 2017-11-01“…The data collection and analysis respected the integrity of the respondents (World Medical Association, 2008) such as anonymity, confidentiality, freedom to participate in the group interviews and to answer the questions in the preferred language. …”
Get full text
Article -
56
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users
Published 2014-01-01“…To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.…”
Get full text
Article -
57
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Published 2014-01-01“…In order to remedy the weaknesses mentioned above, we propose an improved anonymous remote authentication scheme using smart card without using bilinear paring computation. …”
Get full text
Article -
58
RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs
Published 2016-03-01“…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. The simulation results show that our scheme is robust to these tactical attacks and preserves privacy against the reputation link attack during the pseudonym changes.…”
Get full text
Article -
59
Fast Antinoise RFID-Aided Medical Care System
Published 2015-10-01“…Besides, our proposed scheme guarantees anonymity on the RFID tags, so the patients' sensitive information and location privacy can be protected. …”
Get full text
Article -
60
Héros malgré lui : le bureau de la signature du traité de Versailles
Published 2024-05-01“…From then on, the piece of furniture moved from anonymity to fame in the 1920s and 1930s, thanks in particular to the postcards publicising the event. …”
Get full text
Article