-
121
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Get full text
Article -
122
-
123
A randomized controlled trial on anonymizing reviewers to each other in peer review discussions.
Published 2024-01-01Get full text
Article -
124
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Get full text
Article -
125
-
126
Esclaves et affranchis chez les Voconces au Haut-Empire : l’apport des inscriptions
Published 2017-12-01Get full text
Article -
127
Home sweet home! Repatriation, reintegration and land allocation in Afghanistan
Published 2013-06-01Get full text
Article -
128
Evaluation for Retinal Therapy for RPE65 Variation Assessed in hiPSC Retinal Pigment Epithelial Cells
Published 2021-01-01Get full text
Article -
129
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01Get full text
Article -
130
On the performance optimization for the cloud architecture with sleep-mode and registration service
Published 2019-10-01Get full text
Article -
131
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Get full text
Article -
132
-
133
Inclusivité linguistique : une quête de clarté et de précision conceptuelle
Published 2024-12-01Get full text
Article -
134
Rényi relative entropy based monogamy of entanglement in tripartite systems
Published 2025-01-01Get full text
Article -
135
LBS-oriented location privacy protection model and scheme
Published 2014-08-01Get full text
Article -
136
-
137
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Get full text
Article -
138
-
139
Child Abandonment in 19th Century Lisbon: The Provenance and Distribution of Foundlings Through a GIS Lens
Published 2025-01-01Get full text
Article -
140
Successful Renal Transplantation between Identical Twins with Very Brief Immunosuppression
Published 2018-01-01Get full text
Article