Showing 41 - 60 results of 426 for search '"Anonymity"', query time: 0.04s Refine Results
  1. 41

    Date Attachable Offline Electronic Cash Scheme by Chun-I Fan, Wei-Zhe Sun, Hoi-Tung Hau

    Published 2014-01-01
    “…It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. …”
    Get full text
    Article
  2. 42

    Privacy preservation in data intensive environment by Jyotir Moy Chatterjee, Raghvendra Kumar, Prasant Kumar Pattnaik, Vijender Kumar Solanki, Noor Zaman

    Published 2018-04-01
    “…After that we have used two methods K-anonymity and fuzzy system for providing the privacy on medical databases in data intensive enviroments. …”
    Get full text
    Article
  3. 43

    Certain Aspects of the Analysis of Cryptocurrency Transactions during the Prevention and Investigation of Crimes by V. V. Nosov, I. A. Manzhai

    Published 2021-03-01
    “…The mechanism of its issuance of guaranteeing pseudo-anonymity while working with cryptocurrency has been outlined. …”
    Get full text
    Article
  4. 44

    An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics by Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng

    Published 2024-01-01
    “…By adding two blinding factors, the anonymity of users is protected. The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. …”
    Get full text
    Article
  5. 45

    Nuove forme di ‘angoscia territoriale’: il caso Viggiano. Strategie culturali di un territorio in crisi by Marialuisa Matera

    Published 2020-06-01
    “…Since the beginning of the last century, Viggiano has shifted from the typical anonymity of a small reality of Southern Italy to the heart of national political events and global economic choices that have elected it the "oil capital of Italy". …”
    Get full text
    Article
  6. 46

    InTEIrviews: An ODD for Qualitative Interviews in the Humanities by Marie Puren, Florian Cafiero

    Published 2024-04-01
    “…This ODD is designed to help describe the actual development of the interview, transcribe the interpretations made by the researcher(s), and tackle ethical or anonymity issues.…”
    Get full text
    Article
  7. 47

    FILOSOFAVIMAS KAIP PASIRUOŠIMAS MIRČIAI by Skirmantas Jankauskas

    Published 2004-01-01
    “…It is shown that because of his anonymity Greek philosopher can not privatize the content of his thinking. …”
    Get full text
    Article
  8. 48

    Autoportraits photographiques américains : De la blancheur à l’ombre chez Alfred Stieglitz ; de la nudité au pastiche chez Lee Miller by Marie Cordié-Levy

    Published 2013-12-01
    “…Shadows in Lake (1916) corresponds to Stieglitz’s return to anonymity and privacy. In a radically different use of overexposure, Neck manifests Lee Miller’s break with her mentor and her wish to control the images of her overexposed nudity. …”
    Get full text
    Article
  9. 49

    Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment by Sung-Wook Park, Im-Yeong Lee

    Published 2016-07-01
    “…In this paper, we propose a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.…”
    Get full text
    Article
  10. 50

    "There’d always be something left" : (im)matérialité de la ville dans Hughie de Eugene O’Neill by Aurélie Sanchez

    Published 2009-12-01
    “…The city is characterized by emptiness and anonymity. The scenery of the play only emphasizes the vacuity of the two characters’ existence. …”
    Get full text
    Article
  11. 51

    Invalidating Factorial Survey Experiments Using Invalid Comparisons Is Bad Practice: Learning from Forster and Neugebauer (2024) by Justin T. Pickett

    Published 2025-01-01
    “…., testing, instrumentation, and conditions of anonymity). In the current article, I discuss each of these major design differences and explain why it invalidates Forster and Neugebauer's (2024) comparison of their FE and FS findings. …”
    Get full text
    Article
  12. 52

    Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks by Liming Zhou, Yingzi Shan, Lu Chen

    Published 2018-01-01
    “…To preserve location privacy of sensors, we use anonymity method to confuse adversaries. To protect the sensitive data, we use prefix membership verification method to prevent adversaries from gaining sensitive messages collected by sensor nodes. …”
    Get full text
    Article
  13. 53

    Provably secure biometric and PUF-based authentication for roaming service in global mobility network by E. Haodudin Nurkifli

    Published 2025-02-01
    “…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
    Get full text
    Article
  14. 54

    Synthetic Browsing Histories for 50 Countries Worldwide: Datasets for Research, Development, and Education by Dan Komosny, Saeed Ur Rehman, Muhammad Sohaib Ayub

    Published 2025-01-01
    “…Research shows that anonymized histories can lead to re-identification, nullifying the anonymity promised by informed consent. …”
    Get full text
    Article
  15. 55

    Les services de Santé Sexuelle et Reproductive en Tunisie. Résultats d’une recherche qualitative auprès des jeunes usagers by Atf Gherissi, Francine Tinsa

    Published 2017-11-01
    “…The data collection and analysis respected the integrity of the respondents (World Medical Association, 2008) such as anonymity, confidentiality, freedom to participate in the group interviews and to answer the questions in the preferred language. …”
    Get full text
    Article
  16. 56

    An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users by Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Published 2014-01-01
    “…To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.…”
    Get full text
    Article
  17. 57

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…In order to remedy the weaknesses mentioned above, we propose an improved anonymous remote authentication scheme using smart card without using bilinear paring computation. …”
    Get full text
    Article
  18. 58

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. The simulation results show that our scheme is robust to these tactical attacks and preserves privacy against the reputation link attack during the pseudonym changes.…”
    Get full text
    Article
  19. 59

    Fast Antinoise RFID-Aided Medical Care System by Ming-Hour Yang, Jia-Ning Luo

    Published 2015-10-01
    “…Besides, our proposed scheme guarantees anonymity on the RFID tags, so the patients' sensitive information and location privacy can be protected. …”
    Get full text
    Article
  20. 60

    Héros malgré lui : le bureau de la signature du traité de Versailles by Claire Bonnotte Khelil

    Published 2024-05-01
    “…From then on, the piece of furniture moved from anonymity to fame in the 1920s and 1930s, thanks in particular to the postcards publicising the event. …”
    Get full text
    Article