-
1
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
2
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
3
-
4
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article -
5
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
6
-
7
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Subjects: Get full text
Article -
8
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
9
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01Subjects: Get full text
Article -
10
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
11
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
12
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
13
L’Anonymat dans les arts et les lettres au Moyen Âge
Published 2016-07-01Subjects: Get full text
Article -
14
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: Get full text
Article -
15
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
16
KAP:location privacy-preserving approach in location services
Published 2014-11-01Subjects: Get full text
Article -
17
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: Get full text
Article -
18
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
19
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
20
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: Get full text
Article