-
1
De-anonymiation method for networks based on DeepLink
Published 2020-08-01Subjects: “…anonymization…”
Get full text
Article -
2
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
3
Online trace anonymization based on anonymous flow table
Published 2016-11-01Subjects: “…network trace anonymization…”
Get full text
Article -
4
Dependable identity recognition and authorization based on visual information
Published 2020-11-01Subjects: Get full text
Article -
5
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01Subjects: Get full text
Article -
6
Differentially private data release based on clustering anonymization
Published 2016-05-01Subjects: Get full text
Article -
7
Implementation of a big data anonymization system based on Spark
Published 2018-04-01Subjects: “…data anonymization…”
Get full text
Article -
8
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Published 2014-11-01Subjects: Get full text
Article -
9
-
10
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01Subjects: Get full text
Article -
11
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01Subjects: Get full text
Article -
12
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: “…anonymous revocation…”
Get full text
Article -
13
-
14
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
15
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01Subjects: Get full text
Article -
16
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
17
-
18
Social criticism and tricky irony in Sanai's mind and language
Published 2019-06-01Subjects: “…anonymous…”
Get full text
Article -
19
WGRe:a re-encryption anonymous tunnel
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article -
20
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article