Showing 301 - 320 results of 17,108 for search '"Anonymity"', query time: 1.43s Refine Results
  1. 301
  2. 302
  3. 303
  4. 304
    ...; health-related messages sent over the internet. Other key concerns include receiver anonymity and forward...
    Get full text
    Article
  5. 305
    by Fang Zheng, Xinguang Peng, Pingzhen Li
    Published 2019-01-01
    ...To achieve privacy protection in the k-anonymity algorithm, replacing the starting positions of k...
    Get full text
    Article
  6. 306
    by Emma von Essen, Jonas Karlsson
    Published 2019-01-01
    ..., automatically discloses the seller's names to the buyer after the auction. In the anonymous auctions, winning...
    Get full text
    Article
  7. 307
    by Yousheng Zhou, Xinyun Chen
    Published 2020-01-01
    ... these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis...
    Get full text
    Article
  8. 308
    by J.L. Song, L.M. Huang, G. Wang, Y. Kang, H.B. Liu
    Published 2015-12-01
    ...Even if k-anonymity model can prevent publishing data from disclosing privacy effectively...
    Get full text
    Article
  9. 309
  10. 310
  11. 311
  12. 312
    by Rongbo Zhang, Jibin Niu, Xin Li, Shanzhi Chen
    Published 2020-01-01
    Subjects: ...anonymous system...
    Get full text
    Article
  13. 313
  14. 314
    by Nam-Su Jho, Taek-Young Youn
    Published 2020-12-01
    ... the prover’s privacy. To handle the security problem, a prover-anonymous and deniable distance bounding...
    Get full text
    Article
  15. 315
  16. 316
  17. 317
  18. 318
    by Ane Carolina Randig Tavares
    Published 2020-05-01
    ... of the pasquinades (anonymous letters) present in the narrative composition of La mala hora (1962), novel written...
    Get full text
    Article
  19. 319
    by Mu Han, Shuai Liu, Shidian Ma, Ailan Wan
    Published 2020-01-01
    ... of the privacy information of the vehicles. Therefore, most existing privacy-protection schemes use anonymous...
    Get full text
    Article
  20. 320
    by Youngseok Chung, Seokjin Choi, Dongho Won
    Published 2015-11-01
    ... in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving...
    Get full text
    Article