-
101
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: Get full text
Article -
102
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01Subjects: Get full text
Article -
103
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
104
LBS-oriented location privacy protection model and scheme
Published 2014-08-01Subjects: Get full text
Article -
105
Reviving/Revising “Lycidas”: Virginia Woolf’s Elegy to Unborn Poets in A Room of One’s Own
Published 2024-12-01Subjects: Get full text
Article -
106
“Dissociating Form and Meaning in Bilingual Creative Writing and Creative Translation Workshops”
Published 2012-03-01Subjects: Get full text
Article -
107
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01Subjects: Get full text
Article -
108
Anonymous access protocol for media independent information service
Published 2010-01-01Subjects: Get full text
Article -
109
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
110
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01Subjects: Get full text
Article -
111
Les Souverains Anonymes : des archives carcérales du « dedans »
Published 2024-01-01Subjects: Get full text
Article -
112
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01Subjects: “…k-anonymity model…”
Get full text
Article -
113
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01Subjects: Get full text
Article -
114
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: Get full text
Article -
115
Le discours direct dans la presse : une approche didactique
Published 2019-12-01Subjects: Get full text
Article -
116
-
117
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Subjects: Get full text
Article -
118
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
119
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01Subjects: Get full text
Article -
120
Attribute-based key-insulated signcryption with bidirectional anonymity
Published 2013-11-01Subjects: Get full text
Article