Suggested Topics within your search.
Suggested Topics within your search.
human
61
Humans
41
female
35
male
34
adult
33
questionnaire
21
Female
20
article
20
Male
19
Article
18
Adult
17
major clinical study
17
COVID-19
16
Surveys and Questionnaires
15
controlled study
15
History
12
Media studies
12
Young Adult
12
psychology
12
young adult
12
aged
11
cross-sectional study
11
Middle Aged
10
human experiment
10
linguistics
9
middle aged
9
pandemic
9
Adolescent
8
Aged
8
Cross-Sectional Studies
8
-
301
-
302
-
303by Brenna Bray, Boris C. Rodríguez-Martín, David A. Wiss, Christine E. Bray, Heather ZwickeySubjects: “...Overeaters Anonymous...”
Published 2021-07-01
Get full text
Article -
304by Insaf Ullah, Ali Alkhalifah, Sajjad Ur Rehman, Neeraj Kumar, Muhammad Asghar Khan“...; health-related messages sent over the internet. Other key concerns include receiver anonymity and forward...”
Published 2021-01-01
Get full text
Article -
305“...To achieve privacy protection in the k-anonymity algorithm, replacing the starting positions of k...”
Get full text
Article -
306“..., automatically discloses the seller's names to the buyer after the auction. In the anonymous auctions, winning...”
Get full text
Article -
307“... these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis...”
Get full text
Article -
308“...Even if k-anonymity model can prevent publishing data from disclosing privacy effectively...”
Get full text
Article -
309
-
310
-
311
-
312
-
313by Nikolaos Petrakos, Stefanos Monachos, Emmanouil Magkos, Panayiotis KotzanikolaouSubjects: “...anonymity...”
Published 2020-09-01
Get full text
Article -
314“... the prover’s privacy. To handle the security problem, a prover-anonymous and deniable distance bounding...”
Get full text
Article -
315
-
316by Ionuț-Cosmin Chiva, Marius Minea, Viviana-Laetitia Minea, Augustin SemenescuSubjects: “...anonymous detection...”
Published 2020-12-01
Get full text
Article -
317
-
318by Ane Carolina Randig Tavares“... of the pasquinades (anonymous letters) present in the narrative composition of La mala hora (1962), novel written...”
Published 2020-05-01
Get full text
Article -
319“... of the privacy information of the vehicles. Therefore, most existing privacy-protection schemes use anonymous...”
Get full text
Article -
320“... in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving...”
Get full text
Article