-
21
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
22
Survey of network-layer anonymous communication protocols
Published 2020-02-01Subjects: “…anonymous communication…”
Get full text
Article -
23
-
24
Location privacy protection technology based on KHINN
Published 2016-09-01Subjects: Get full text
Article -
25
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Subjects: Get full text
Article -
26
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
27
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01Subjects: Get full text
Article -
28
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article -
29
Diversity of controllable anonymous communication system
Published 2015-06-01Subjects: “…anonymous communication system…”
Get full text
Article -
30
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
31
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
32
Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme
Published 2019-10-01Subjects: “…anonymous communication…”
Get full text
Article -
33
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
34
L’Anonymat dans les arts et les lettres au Moyen Âge
Published 2016-07-01Subjects: Get full text
Article -
35
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: Get full text
Article -
36
The declaration of adoptability situation at a crossroads
Published 2025-02-01Subjects: Get full text
Article -
37
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: Get full text
Article -
38
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: Get full text
Article -
39
Anonymous aggregator election protocol for wireless sensor networks
Published 2015-02-01Subjects: Get full text
Article -
40
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01Subjects: Get full text
Article