-
41
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01Subjects: Get full text
Article -
42
Differentially private data release based on clustering anonymization
Published 2016-05-01Subjects: Get full text
Article -
43
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
44
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
45
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: Get full text
Article -
46
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
47
Implementation of a big data anonymization system based on Spark
Published 2018-04-01Subjects: “…data anonymization…”
Get full text
Article -
48
Boardroom electronic voting scheme based on DC-net
Published 2012-09-01Subjects: Get full text
Article -
49
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: “…anonymity…”
Get full text
Article -
50
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01Subjects: “…anonymous communication…”
Get full text
Article -
51
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01Subjects: Get full text
Article -
52
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Subjects: Get full text
Article -
53
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01Subjects: Get full text
Article -
54
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Published 2014-11-01Subjects: Get full text
Article -
55
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article -
56
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01Subjects: Get full text
Article -
57
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: Get full text
Article -
58
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01Subjects: Get full text
Article -
59
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: Get full text
Article -
60
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01Subjects: Get full text
Article