Showing 161 - 180 results of 17,108 for search '"Anonymity"', query time: 1.57s Refine Results
  1. 161
  2. 162
  3. 163
    Subjects: ...Anonymous pricing...
    View Fulltext in Publisher
    Article
  4. 164
    by Ashlagi, Itai, Serizawa, Shigehiro
    Published 2011
    Get fulltext
    Article
  5. 165
  6. 166
  7. 167
  8. 168
  9. 169
    by Daniel Romano Ozcáriz
    Published 2017-08-01
    ... ciberactivistas autodenominado Anonymous, pero ¿qué sabemos realmente de ellos? Ciertamente poco, debido en parte...
    Get full text
    Article
  10. 170
  11. 171
    ... routing, finishing with a new geographical routing scheme GARAP, which holds anonymous properties. === A...
    Get full text
    Others
  12. 172
  13. 173
    ... application, anonymous access to some resources, etc.), anonymity pops up as one of the main security...
    Get full text
    Others
  14. 174
  15. 175
    by Chi-Sheng Lin, 林其生
    Published 2014
    ...碩士 === 國立虎尾科技大學 === 資訊工程研究所 === 102 === The anonymous user authenticationschemes in wireless...
    Get full text
    Others
  16. 176
    by Cohen, Aloni(Aloni Jonathan)
    Published 2019
    ..., and proxy reencryption. The second part is dedicate to advancing the understanding of data anonymization. We...
    Get full text
    Others
  17. 177
    by Ling-Ying Huang, 黃齡瑩
    Published 2007
    ... among these schemes. In this thesis, we present an anonymous multi-receiver identity-based encryption...
    Get full text
    Others
  18. 178
    by Chien-Jui Huang, 黃千瑞
    Published 2018
    ... the Anonymous Metadata Separated Cloud Storage System (AMSC). AMSC improves cloud storage systems by utilizing...
    Get full text
    Others
  19. 179
  20. 180
    by Chia-Hao Hsu, 許家豪
    Published 2013
    ...-anonymity on individual patterns or individual items, we propose the k-anonymity of multi-pattern (KAMP...
    Get full text
    Others