Suggested Topics within your search.
Suggested Topics within your search.
human
61
Humans
41
female
35
male
34
adult
33
questionnaire
21
Female
20
article
20
Male
19
Article
18
Adult
17
major clinical study
17
COVID-19
16
Surveys and Questionnaires
15
controlled study
15
History
12
Media studies
12
Young Adult
12
psychology
12
young adult
12
aged
11
cross-sectional study
11
Middle Aged
10
human experiment
10
linguistics
9
middle aged
9
pandemic
9
Adolescent
8
Aged
8
Cross-Sectional Studies
8
-
161
-
162
-
163
-
164
-
165
-
166
-
167
-
168
-
169by Daniel Romano Ozcáriz“... ciberactivistas autodenominado Anonymous, pero ¿qué sabemos realmente de ellos? Ciertamente poco, debido en parte...”
Published 2017-08-01
Get full text
Article -
170by Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Moonseong Kim, Juryon Paik, Dongho Won“... user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques...”
Published 2015-01-01
Get full text
Article -
171
Get full text
Others -
172
-
173
Get full text
Others -
174
-
175“...碩士 === 國立虎尾科技大學 === 資訊工程研究所 === 102 === The anonymous user authenticationschemes in wireless...”
Get full text
Others -
176by Cohen, Aloni(Aloni Jonathan)“..., and proxy reencryption. The second part is dedicate to advancing the understanding of data anonymization. We...”
Published 2019
Get full text
Others -
177“... among these schemes. In this thesis, we present an anonymous multi-receiver identity-based encryption...”
Get full text
Others -
178“... the Anonymous Metadata Separated Cloud Storage System (AMSC). AMSC improves cloud storage systems by utilizing...”
Get full text
Others -
179
-
180“...-anonymity on individual patterns or individual items, we propose the k-anonymity of multi-pattern (KAMP...”
Get full text
Others