-
21
Diversity of controllable anonymous communication system
Published 2015-06-01Subjects: “…anonymous communication system…”
Get full text
Article -
22
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
23
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
24
Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme
Published 2019-10-01Subjects: “…anonymous communication…”
Get full text
Article -
25
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
26
Online trace anonymization based on anonymous flow table
Published 2016-11-01Subjects: “…network trace anonymization…”
Get full text
Article -
27
L’Anonymat dans les arts et les lettres au Moyen Âge
Published 2016-07-01Subjects: Get full text
Article -
28
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: Get full text
Article -
29
Dependable identity recognition and authorization based on visual information
Published 2020-11-01Subjects: Get full text
Article -
30
The declaration of adoptability situation at a crossroads
Published 2025-02-01Subjects: Get full text
Article -
31
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: Get full text
Article -
32
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: Get full text
Article -
33
Anonymous aggregator election protocol for wireless sensor networks
Published 2015-02-01Subjects: Get full text
Article -
34
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01Subjects: Get full text
Article -
35
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01Subjects: Get full text
Article -
36
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
37
KAP:location privacy-preserving approach in location services
Published 2014-11-01Subjects: Get full text
Article -
38
Efficient hybrid-encryption-based optimistic Mix-net protocol
Published 2014-11-01Subjects: “…anonymous communication…”
Get full text
Article -
39
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: Get full text
Article -
40
Trajectories anonymous algorithm for association attack
Published 2017-06-01Subjects: Get full text
Article