-
81
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01Subjects: Get full text
Article -
82
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01Subjects: Get full text
Article -
83
Efficient strong privacy protection and transferable attribute-based ticket scheme
Published 2022-03-01Subjects: Get full text
Article -
84
Les Souverains Anonymes : des archives carcérales du « dedans »
Published 2024-01-01Subjects: Get full text
Article -
85
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01Subjects: “…k-anonymity model…”
Get full text
Article -
86
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01Subjects: Get full text
Article -
87
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: Get full text
Article -
88
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
89
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: “…anonymous authentication…”
Get full text
Article -
90
Le discours direct dans la presse : une approche didactique
Published 2019-12-01Subjects: Get full text
Article -
91
-
92
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Subjects: Get full text
Article -
93
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
94
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: Get full text
Article -
95
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01Subjects: Get full text
Article -
96
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01Subjects: Get full text
Article -
97
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
98
Attribute-based key-insulated signcryption with bidirectional anonymity
Published 2013-11-01Subjects: Get full text
Article -
99
-
100
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Subjects: Get full text
Article