Search

Your search keyword '"Pseudonymity"' showing total 135 results

Search Constraints

Start Over You searched for: Descriptor "Pseudonymity" Remove constraint Descriptor: "Pseudonymity" Topic computer science Remove constraint Topic: computer science
135 results on '"Pseudonymity"'

Search Results

1. Cryptocurrency Scams: Analysis and Perspectives

2. RAIAP: renewable authentication on isolated anonymous profiles

Catalog

Books, media, physical & digital resources

3. A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing

4. UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies

5. A Truly Self-Sovereign Identity System

6. Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

7. BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things

8. Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies

9. Privacy-friendly platform for healthcare data in cloud based on blockchain environment

10. Privacy by Architecture Pseudonym Framework for Delay Tolerant Network

11. Security and Privacy Concerns for Blockchain While Handling Healthcare Data

12. A Criminal Smart Contract for Distributed Denial of Service Attacks

13. Privacy-Aware Ant Routing for Wireless Multimedia Sensor Networks in Healthcare

14. Attribute-based pseudonymity for privacy-preserving authentication in cloud services

15. Towards Understanding and Demystifying Bitcoin Mixing Services

16. TheCoin: Privacy and security considerations within blockchain transactions

17. A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement

18. Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough

19. WITHDRAWN: QABA: A privacy model to reduce adversary attacks for cloud storage

20. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy

21. Secure and anonymous decentralized Bitcoin mixing

22. Scalable Private Set Intersection Based on OT Extension

23. Anonymity Leakage in Private VoIP Networks

24. LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X

25. From usernames to profiles: the development of pseudonymity in Internet communication

26. Deanonymizing Tor hidden service users through Bitcoin transactions analysis

27. Anonymity in Cryptocurrencies

28. Blockchain-Based Secure E-Voting with the Assistance of Smart Contract

29. Authenticating Deeds/Organizing Society Considerations for Blockchain-Based Land Registries

30. Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services

31. Explaining Cybersecurity with Films and the Arts

32. Machine Learning Based Bitcoin Address Classification

33. Exploring Anonymous User Reviews: Linkability Analysis Based on Machine Learning

34. Secrecy and Anonymity Online

35. Security-Oriented Architecture for Managing IoT Deployments

36. Abstracting Syntactic Privacy Notions via Privacy Games

37. Risk Analysis on C-ITS pseudonymity aspects

38. Authenticated and Privacy-Preserving Consent Management in the Internet of Things

39. Privacy Preservation of Users in P2P E-Payment System

40. Privacy Patterns for Pseudonymity

41. Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis

42. Cryptotransport

43. Online masquerade: Redesigning the internet for free speech through the use of pseudonyms

44. Geocoding Without Geotags: A Text-based Approach for reddit

45. Analysis and Evaluation of Syntactic Privacy Notions and Games

46. On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing

47. Data Mining for Detecting Bitcoin Ponzi Schemes

48. Resolving polysemy and pseudonymity in entity linking with comprehensive name and context modeling

49. Privacy Preservation through Uniformity

50. mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies