-
61
-
62
Anonymizing region construction scheme based on query range in location-based service privacy protection
Published 2017-09-01Subjects: Get full text
Article -
63
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
64
Progress in research on active network flow watermark
Published 2014-07-01Subjects: Get full text
Article -
65
Concept and structure of the special forces of operative-search activity
Published 2019-06-01Subjects: Get full text
Article -
66
k-times attribute-based authentication scheme using direct anonymous attestation
Published 2018-12-01Subjects: Get full text
Article -
67
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Subjects: Get full text
Article -
68
Efficient certificateless multi-receiver anonymous signcryption scheme
Published 2016-06-01Subjects: Get full text
Article -
69
Educational “Looking Glass”, or “They” and “We”
Published 2018-12-01Subjects: Get full text
Article -
70
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article -
71
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
72
-
73
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Subjects: Get full text
Article -
74
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
75
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
76
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01Subjects: Get full text
Article -
77
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
78
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
79
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
80
Online trace anonymization based on anonymous flow table
Published 2016-11-01Subjects: “…network trace anonymization…”
Get full text
Article