-
81
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: Get full text
Article -
82
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01Subjects: Get full text
Article -
83
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01Subjects: Get full text
Article -
84
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
85
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01Subjects: Get full text
Article -
86
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2020-04-01Subjects: Get full text
Article -
87
Personalized privacy protection method for group recommendation
Published 2019-09-01Subjects: Get full text
Article -
88
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: Get full text
Article -
89
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01Subjects: “…anonymous authentication…”
Get full text
Article -
90
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01Subjects: “…anonymous communication…”
Get full text
Article -
91
A Letter to the Editor: The Peer Review Process: Past, Present, and Future
Published 2025-01-01Subjects: Get full text
Article -
92
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01Subjects: Get full text
Article -
93
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01Subjects: Get full text
Article -
94
Comparative study of anonymous network Tor and I2P
Published 2019-02-01Subjects: “…anonymous network…”
Get full text
Article -
95
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01Subjects: Get full text
Article -
96
Efficient strong privacy protection and transferable attribute-based ticket scheme
Published 2022-03-01Subjects: Get full text
Article -
97
Les Souverains Anonymes : des archives carcérales du « dedans »
Published 2024-01-01Subjects: Get full text
Article -
98
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
99
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: “…anonymous authentication…”
Get full text
Article -
100
Le discours direct dans la presse : une approche didactique
Published 2019-12-01Subjects: Get full text
Article