Showing 221 - 240 results of 17,108 for search '"Anonymity"', query time: 0.89s Refine Results
  1. 221
  2. 222
    by Fan-Yu Yeh, 葉方煜
    Published 2005
    ... transmission. We will propose an anonymous and traceable mobile agent roaming scheme. We can apply...
    Get full text
    Others
  3. 223
    by Shang-Lun Kuo, 郭上倫
    Published 2010
    ... of these research works. The security problems including the capabilities of tag anonymity, resistance to replaying...
    Get full text
    Others
  4. 224
    by Bo-Ting Wong, 翁博亭
    Published 2012
    ... breaches in e-rental services. In this paper, we propose a protocol for anonymous e-rental services...
    Get full text
    Others
  5. 225
    by Kai-Hsun Hu, 胡凱勛
    Published 2012
    ... have been proposed to use an anonymizer to obfuscate users’ private information first and then forward...
    Get full text
    Others
  6. 226
  7. 227
    by Pei-Jen Tsai, 蔡佩珍
    Published 2011
    ... secure and efficient anonymous multi-receiver certificated-based encryption schemes, PMCE and SCMCE...
    Get full text
    Others
  8. 228
    by Hung Ming Chuang, 莊閎名
    Published 2013
    ... are anonymous in cloud environment and anonymity can decrease personal privacy data disclosing. The issuer can...
    Get full text
    Others
  9. 229
    by Szu-Yin Huang, 黃思穎
    Published 2013
    .... For this reason, we propose a new anonymous payment protocol for current NFC-based mobile payment services. We...
    Get full text
    Others
  10. 230
    by Jian-You Liu, 劉建佑
    Published 2012
    ... authentication. In this thesis, we come up with an anonymous authentication and key agreement scheme based...
    Get full text
    Others
  11. 231
  12. 232
    by Shih-che Hung, 洪士哲
    Published 2011
    ... et al.’s anonymous proxy signature scheme proposed in 2009 attempting to protect the proxy signer’s...
    Get full text
    Others
  13. 233
    by Chou, Lei Sheng, 周雷生
    Published 2006
    ... some solutions to address problems, and do not change the GSM architecture. We also provide anonymous...
    Get full text
    Others
  14. 234
    by Z.L.Yang, 楊生榮
    Published 1999
    .... In this thesis, we implement anonymous voting system with a complete supervision at the PC’s environment...
    Get full text
    Others
  15. 235
    by Newcombe, Scott Ryan
    Published 2016
    ... of the Alcoholics Anonymous (AA) program and levels of shame and self-compassion. The sample consisted of 148 active...
    Get full text
  16. 236
    by Jen-Chun Hsu, 許任鈞
    Published 2013
    ... the identity authentication process and obtain service, but also attach impor- tance to their anonymity...
    Get full text
    Others
  17. 237
  18. 238
    by Nieh, Jong-Liang, 聶忠良
    Published 1996
    ...碩士 === 國立交通大學 === 資訊管理研究所 === 84 === In this thesis, we have developed an anonymous voting...
    Get full text
    Others
  19. 239
    by Ku-kuan Hung, 洪谷官
    Published 2008
    ..., modification or impersonator attack. An group authenticated key agreement with anonymity provides entities...
    Get full text
    Others
  20. 240