-
101
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
102
Comparative study of anonymous network Tor and I2P
Published 2019-02-01Subjects: “…anonymous network…”
Get full text
Article -
103
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. …”
Get full text
Article -
104
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. …”
Get full text
Article -
105
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01Subjects: Get full text
Article -
106
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Published 2016-01-01“…A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. …”
Get full text
Article -
107
Les Souverains Anonymes : des archives carcérales du « dedans »
Published 2024-01-01Subjects: Get full text
Article -
108
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01Subjects: Get full text
Article -
109
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01Subjects: Get full text
Article -
110
Spatially Resolved Multiomics: Data Analysis from Monoomics to Multiomics
Published 2025-01-01“…Spatial monoomics has been recognized as a powerful tool for exploring life sciences. …”
Get full text
Article -
111
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
112
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
113
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
114
Algorithm for k-anonymity based on projection area density partition
Published 2015-08-01Subjects: Get full text
Article -
115
Metaphorical Toponyms of Present-Day Vilnius County: Extending Toponymy Research through Cognitive Metaphor Theory
Published 2025-01-01Subjects: “…Vilnius County toponyms…”
Get full text
Article -
116
RETRACTED: Motivation of English oil and gas terms with a zoonym component
Published 2024-01-01Get full text
Article -
117
A recurrent synonymous L1CAM variant in a fetus with hydrocephalus
Published 2024-01-01“…Abstract We report the case of a hydrocephalic fetus in which clinical exome sequencing revealed a recurrent synonymous variant of unknown significance, c.453G>T, in the L1CAM gene. …”
Get full text
Article -
118
IL-4 induces cAMP and cGMP in human monocytic cells
Published 1995-01-01“…Human monocytes, preincubated with IFN-γ respond to IL-4 by a cGMP increase through activation of an inducible NO synthase. …”
Get full text
Article -
119
A Peptide Analogue of Selectin Ligands Attenuated Atherosclerosis by Inhibiting Monocyte Activation
Published 2019-01-01“…Background. Circulating monocytes play a critical role in the pathogenesis of atherosclerosis. …”
Get full text
Article -
120
What is not in a name? Toponymic ambivalence, identity, and symbolic resistance in the Nepali flatlands
Published 2020-09-01“…This paper seeks to understand how elites utilize toponyms to either underscore territorial claims and belonging to a nation or to undermine those claims. …”
Get full text
Article