-
61
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01Subjects: Get full text
Article -
62
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
63
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01Subjects: Get full text
Article -
64
LBS-oriented location privacy protection model and scheme
Published 2014-08-01Subjects: Get full text
Article -
65
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
66
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01Subjects: Get full text
Article -
67
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2020-04-01Subjects: Get full text
Article -
68
Personalized privacy protection method for group recommendation
Published 2019-09-01Subjects: Get full text
Article -
69
Reviving/Revising “Lycidas”: Virginia Woolf’s Elegy to Unborn Poets in A Room of One’s Own
Published 2024-12-01Subjects: Get full text
Article -
70
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: Get full text
Article -
71
“Dissociating Form and Meaning in Bilingual Creative Writing and Creative Translation Workshops”
Published 2012-03-01Subjects: Get full text
Article -
72
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01Subjects: Get full text
Article -
73
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01Subjects: “…anonymous authentication…”
Get full text
Article -
74
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01Subjects: “…anonymous communication…”
Get full text
Article -
75
A Letter to the Editor: The Peer Review Process: Past, Present, and Future
Published 2025-01-01Subjects: Get full text
Article -
76
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01Subjects: Get full text
Article -
77
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01Subjects: Get full text
Article -
78
Anonymous access protocol for media independent information service
Published 2010-01-01Subjects: Get full text
Article -
79
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
80
Comparative study of anonymous network Tor and I2P
Published 2019-02-01Subjects: “…anonymous network…”
Get full text
Article