Suggested Topics within your search.
Suggested Topics within your search.
human
61
Humans
41
female
35
male
34
adult
33
questionnaire
21
Female
20
article
20
Male
19
Article
18
Adult
17
major clinical study
17
COVID-19
16
Surveys and Questionnaires
15
controlled study
15
History
12
Media studies
12
Young Adult
12
psychology
12
young adult
12
aged
11
cross-sectional study
11
Middle Aged
10
human experiment
10
linguistics
9
middle aged
9
pandemic
9
Adolescent
8
Aged
8
Cross-Sectional Studies
8
-
221
-
222“... transmission. We will propose an anonymous and traceable mobile agent roaming scheme. We can apply...”
Get full text
Others -
223“... of these research works. The security problems including the capabilities of tag anonymity, resistance to replaying...”
Get full text
Others -
224“... breaches in e-rental services. In this paper, we propose a protocol for anonymous e-rental services...”
Get full text
Others -
225“... have been proposed to use an anonymizer to obfuscate users’ private information first and then forward...”
Get full text
Others -
226
-
227“... secure and efficient anonymous multi-receiver certificated-based encryption schemes, PMCE and SCMCE...”
Get full text
Others -
228“... are anonymous in cloud environment and anonymity can decrease personal privacy data disclosing. The issuer can...”
Get full text
Others -
229“.... For this reason, we propose a new anonymous payment protocol for current NFC-based mobile payment services. We...”
Get full text
Others -
230“... authentication. In this thesis, we come up with an anonymous authentication and key agreement scheme based...”
Get full text
Others -
231by Davidson Alex, Goldberg Ian, Sullivan Nick, Tankersley George, Valsorda FilippoSubjects: “...anonymity...”
Published 2018-06-01
Get full text
Article -
232“... et al.’s anonymous proxy signature scheme proposed in 2009 attempting to protect the proxy signer’s...”
Get full text
Others -
233“... some solutions to address problems, and do not change the GSM architecture. We also provide anonymous...”
Get full text
Others -
234“.... In this thesis, we implement anonymous voting system with a complete supervision at the PC’s environment...”
Get full text
Others -
235by Newcombe, Scott Ryan“... of the Alcoholics Anonymous (AA) program and levels of shame and self-compassion. The sample consisted of 148 active...”
Published 2016
Get full text
-
236“... the identity authentication process and obtain service, but also attach impor- tance to their anonymity...”
Get full text
Others -
237
-
238“...碩士 === 國立交通大學 === 資訊管理研究所 === 84 === In this thesis, we have developed an anonymous voting...”
Get full text
Others -
239“..., modification or impersonator attack. An group authenticated key agreement with anonymity provides entities...”
Get full text
Others -
240