-
41
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Subjects: Get full text
Article -
42
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
43
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01Subjects: Get full text
Article -
44
Attribute-based key-insulated signcryption with bidirectional anonymity
Published 2013-11-01Subjects: Get full text
Article -
45
Uncertain trajectory privacy-preserving method of moving object
Published 2015-11-01Subjects: Get full text
Article -
46
Personal data privacy protection method based onvertical partitioning
Published 2024-10-01Subjects: Get full text
Article -
47
-
48
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
Published 2023-12-01Subjects: Get full text
Article -
49
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01Subjects: Get full text
Article -
50
De-anonymiation method for networks based on DeepLink
Published 2020-08-01Subjects: “…anonymization…”
Get full text
Article -
51
-
52
Social criticism and tricky irony in Sanai's mind and language
Published 2019-06-01Subjects: “…anonymous…”
Get full text
Article -
53
WGRe:a re-encryption anonymous tunnel
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article -
54
MUKAYESELİ HUKUK VE TÜRK HUKUKU KAPSAMINDA DAVALININ BİLİN(E)MEMESİNİN DAVANIN AÇILMASI BAKIMINDAN DEĞERLENDİRİLMESİ
Published 2024-07-01Subjects: Get full text
Article -
55
Sociological and legal aspects of authentication in social networks through passport data
Published 2022-07-01Subjects: Get full text
Article -
56
Survey of network-layer anonymous communication protocols
Published 2020-02-01Subjects: “…anonymous communication…”
Get full text
Article -
57
Location privacy protection technology based on KHINN
Published 2016-09-01Subjects: Get full text
Article -
58
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
59
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article -
60
Diversity of controllable anonymous communication system
Published 2015-06-01Subjects: “…anonymous communication system…”
Get full text
Article