1,126 results on '"anonymity"'
Search Results
2. A Review of Anonymization Algorithms and Methods in Big Data
3. Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
4. A generic framework for blockchain-assisted on-chain auditing for off-chain storage
5. Two families of values for global cooperative games
6. Optimizing Base Station’s Anonymity with PID-Controlled Fake Packets and Data Aggregation
7. Security assessment and improvement of smart grid NIKE protocol
8. Forensic investigation of the dark web on the Tor network: pathway toward the surface web
9. Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment
10. Anonymity and everlasting privacy in electronic voting
11. A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
12. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
13. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
14. Hermann Hesse auf Verjüngungskur oder Autor wider Willen: Über Demian und die pseudonymen Publikationspraktiken des 20. Jahrhunderts
15. Pricing Anonymity
16. An anonymous and unlinkable electronic toll collection system
17. Footprint Scheduling for Dining-Cryptographer Networks
18. Private eCash in Practice (Short Paper)
19. Pragmatic authenticated key agreement for IEEE Std 802.15.6
20. Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
21. Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
22. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
23. Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social Networks
24. Anonymous and Publicly Linkable Reputation Systems
25. Public Verification of Private Effort
26. Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks
27. Cryptanalysis of Two Authentication Scheme for DRM System
28. Efficient Data Protection Scheme in Hybrid Clouds
29. Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks
30. Ethics in e-Business: Emerging Issues and Enduring Themes
31. MoP-2-MoP – Mobile Private Microblogging
32. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
33. Increasing Anonymity in Bitcoin
34. Traceable Group Encryption
35. An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
36. Enhanced end-to-end security through symmetric-key cryptography in wearable medical sensor networks
37. Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections
38. Cryptanalysis on the User Authentication Scheme with Anonymity
39. Data Anonymization According to the Combination of Attributes on Social Network Sites
40. Optimized Anonymity for Intergenerational Communication Based on the Concept of Crowdsourcing
41. Anonymous Transferable Conditional E-cash
42. More Anonymity through Trust Degree in Trust-Based Onion Routing
43. A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System
44. Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card
45. Lattice-Based Group Signatures with Logarithmic Signature Size
46. Anonymous Signcryption against Linear Related-Key Attacks
47. Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings
48. AnonyFacebook - Liking Facebook Posts Anonymously
49. On Mining Sensitive Rules to Identify Privacy Threats
50. Achieving Anonymity against Major Face Recognition Algorithms
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.