-
1
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01Subjects: Get full text
Article -
2
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: “…anonymous revocation…”
Get full text
Article -
3
-
4
De-anonymiation method for networks based on DeepLink
Published 2020-08-01Subjects: “…anonymization…”
Get full text
Article -
5
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
6
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01Subjects: Get full text
Article -
7
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
8
-
9
Social criticism and tricky irony in Sanai's mind and language
Published 2019-06-01Subjects: “…anonymous…”
Get full text
Article -
10
WGRe:a re-encryption anonymous tunnel
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article -
11
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article -
12
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
13
Survey of network-layer anonymous communication protocols
Published 2020-02-01Subjects: “…anonymous communication…”
Get full text
Article -
14
-
15
Location privacy protection technology based on KHINN
Published 2016-09-01Subjects: Get full text
Article -
16
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Subjects: Get full text
Article -
17
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
18
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
19
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01Subjects: Get full text
Article -
20
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01Subjects: “…anonymous communication…”
Get full text
Article