-
41
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
42
KAP:location privacy-preserving approach in location services
Published 2014-11-01Subjects: Get full text
Article -
43
Efficient hybrid-encryption-based optimistic Mix-net protocol
Published 2014-11-01Subjects: “…anonymous communication…”
Get full text
Article -
44
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: Get full text
Article -
45
Trajectories anonymous algorithm for association attack
Published 2017-06-01Subjects: Get full text
Article -
46
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01Subjects: Get full text
Article -
47
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
48
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
49
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: Get full text
Article -
50
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
51
Boardroom electronic voting scheme based on DC-net
Published 2012-09-01Subjects: Get full text
Article -
52
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: “…anonymity…”
Get full text
Article -
53
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01Subjects: “…anonymous communication…”
Get full text
Article -
54
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01Subjects: Get full text
Article -
55
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Subjects: Get full text
Article -
56
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01Subjects: Get full text
Article -
57
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article -
58
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01Subjects: Get full text
Article -
59
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01Subjects: Get full text
Article -
60
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: Get full text
Article