-
1
-
2
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: “…authentication;anonymity;security analysis…”
Get full text
Article -
3
An efficient lattice-based integrated revocable identity-based encryption
Published 2025-05-01Subjects: Get full text
Article -
4
-
5
Hiding identities of MQTT devices against a global network adversary
Published 2025-02-01Subjects: Get full text
Article -
6
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article -
7
Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography
Published 2025-09-01Subjects: Get full text
Article -
8
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Subjects: “…ring signature;standard model;anonymity;unforgeability…”
Get full text
Article -
9
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
10
BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
Published 2024-09-01Subjects: Get full text
Article -
11
-
12
Conventionalised Impoliteness towards Perceived ESL Users on 4chan
Published 2018-12-01Subjects: “…Conventionalised impoliteness, anonymity, and language-based discrimination…”
Get full text
Article -
13
Conventionalised Impoliteness towards Perceived ESL Users on 4chan
Published 2018-12-01Subjects: “…Conventionalised impoliteness, anonymity, and language-based discrimination…”
Get full text
Article -
14
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
15
Security Authentication Protocol for Underwater Sensor Networks Based on NTRU
Published 2025-04-01Subjects: Get full text
Article -
16
Distributed resource governance on a blockchain
Published 2023-12-01Subjects: Get full text
Article -
17
Effects of anonymity on decision making and evaluations of others' decisions in moral dilemmas
Published 2025-09-01Subjects: “…Anonymity…”
Get full text
Article -
18
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
19
An Evaluation on Anonymity and Known Painters in Byzantine Painting Art
Published 2023-07-01Subjects: “…anonymity…”
Get full text
Article -
20
Fact-Checking 5G Security: Bridging the Gap Between Expectations and Reality
Published 2025-01-01Subjects: Get full text
Article