-
81
L’Anonymat dans les arts et les lettres au Moyen Âge
Published 2016-07-01Subjects: Get full text
Article -
82
Dependable identity recognition and authorization based on visual information
Published 2020-11-01Subjects: Get full text
Article -
83
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: Get full text
Article -
84
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01Subjects: Get full text
Article -
85
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
86
KAP:location privacy-preserving approach in location services
Published 2014-11-01Subjects: Get full text
Article -
87
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: Get full text
Article -
88
Differentially private data release based on clustering anonymization
Published 2016-05-01Subjects: Get full text
Article -
89
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
90
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
91
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: Get full text
Article -
92
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
93
Implementation of a big data anonymization system based on Spark
Published 2018-04-01Subjects: “…data anonymization…”
Get full text
Article -
94
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: “…anonymity…”
Get full text
Article -
95
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Subjects: Get full text
Article -
96
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Published 2014-11-01Subjects: Get full text
Article -
97
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article -
98
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01Subjects: Get full text
Article -
99
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01Subjects: Get full text
Article -
100
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01Subjects: Get full text
Article