-
21
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
22
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: “…anonymity…”
Get full text
Article -
23
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Subjects: Get full text
Article -
24
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article -
25
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01Subjects: Get full text
Article -
26
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01Subjects: Get full text
Article -
27
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: Get full text
Article -
28
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01Subjects: Get full text
Article -
29
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
30
LBS-oriented location privacy protection model and scheme
Published 2014-08-01Subjects: Get full text
Article -
31
Reviving/Revising “Lycidas”: Virginia Woolf’s Elegy to Unborn Poets in A Room of One’s Own
Published 2024-12-01Subjects: Get full text
Article -
32
“Dissociating Form and Meaning in Bilingual Creative Writing and Creative Translation Workshops”
Published 2012-03-01Subjects: Get full text
Article -
33
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01Subjects: Get full text
Article -
34
Anonymous access protocol for media independent information service
Published 2010-01-01Subjects: Get full text
Article -
35
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
36
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01Subjects: Get full text
Article -
37
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01Subjects: “…k-anonymity model…”
Get full text
Article -
38
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01Subjects: Get full text
Article -
39
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: Get full text
Article -
40
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: “…anonymous revocation…”
Get full text
Article