Search

Your search keyword '"anonymity"' showing total 21,130 results

Search Constraints

Start Over You searched for: Descriptor "anonymity" Remove constraint Descriptor: "anonymity"
21,130 results on '"anonymity"'

Search Results

1. A Small Clue Made of Fragmented Pieces.

2. Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity.

3. A comprehensive review of cancelable biometrics for cybersecurity solutions.

4. On Distributed Computing: A View, Physical Versus Logical Objects, and a Look at Fully Anonymous Systems

5. LARMix: Latency-Aware Routing in Mix Networks with Free Routes Topology

6. On the Anonymity of Linkable Ring Signatures

7. BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics.

8. Each counts for one.

9. Providing Delayed, In-Person Collected Feedback From Residents to Teaching Faculty: Lessons Learned.

10. Lyric Anonymity: Songs of Love and Pastoral Care in Lambeth 853.

11. Blockchain-based group signature for secure authentication of IoT systems in smart home environments.

12. "Your History is Being Worked Up": Microfiction in the Age of the Fourth Industrial Revolution.

13. Anonymous Gamete Donation: a Case for Balancing Under Article 8 ECHR.

14. Maria: Eine Geschichte in Briefen: Ein Spiel herausgeberischer Simulationen?

15. In Her Own Hand: Female Agency around 1800.

16. Anonymous Access System with Limited Number of Uses in a Trustless Environment.

17. Information security for criminological ethnographers.

18. How to be not economic: abundance and the history of strolling.

19. An anonymous broadcasting system with accountability based on group signatures.

20. From meme-making trolls to feminist artists: digital feminist art activism in contemporary South Korea.

21. Manipulable, reversible and diversified de-identification via face identity disentanglement.

22. Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid.

23. A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof.

24. Service Members' Attitudes Toward Reporting Hazing Incidents.

25. Teacher and leader research: The ethics of researching your own practice.

26. Undoing slavery's anonymity: The politics of identification in twenty-first century Black Canadian poetry.

27. Oocyte donors' experience and expectations in a non-profit fertility care setting.

28. Response to Focus Issue.

29. Authorship and Accountability: Kierkegaard and Anonymity in the Press.

30. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval.

31. The definition of assertion: Commitment and truth.

32. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

33. Digital Confessions: The Willingness to Disclose Intimate Information to a Chatbot and its Impact on Emotional Well-Being.

34. وب پنهان و حق گمنامی از منظر حقوق بین الملل بشر.

35. AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS.

36. Proxy re-signature scheme with cryptographic reverse firewall for medical data security.

37. A secure user authentication scheme for crypto-wallet in IoT environment.

38. Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid.

39. Examining the escalation of hostility in social media: a comparative analysis of online incivility in China and the United States regarding the Russia–Ukraine war.

40. Dynamic group fuzzy extractor.

41. False-name-proof and strategy-proof voting rules under separable preferences.

42. Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems.

43. Ethics in Crisis? A Paradigm Revolution for Ethical Research in the Social Sciences.

44. Comment and improvement on the "semi-quantum ring signature protocol based on multi-particle GHZ state".

45. THE PHENOMENON OF CYBERBULLYING BEHAVIOR AMONG TEENAGERS IN PADANG CITY: PRELIMINARY STUDY.

46. An Efficient Certificateless Anonymous Signcryption Scheme for WBAN.

47. Algorithmic crime prevention. From abstract police to precision policing.

48. Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems.

49. Relational tactics and trust in high-risk activism: Anonymity, preexisting ties, and bonding in Hong Kong's 2019–2020 protest.

50. Decentralized Federated Recommendation with Privacy-aware Structured Client-level Graph.

Catalog

Books, media, physical & digital resources