Showing 1 - 20 results of 1,473 for search '"Anonymity"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    L’identification des anonymes by Antoine Briand

    Published 2022-10-01
    “…Analysis of the victimology of those who lose their identity, and of the administrative and medical management of their situation, reveals institutional strategies for invisibilising or giving visibility to bodies and anonymous cases. Missing persons and unidentified bodies become revealers of social discrimination logics that transcend the life and death of numerous individuals in India. …”
    Get full text
    Article
  6. 6
  7. 7

    Anonymous survey system based on NIZK by Lu LIU, Yu-xi LI, Fu-cai ZHOU

    Published 2016-12-01
    Subjects: “…anonymous electronic survey…”
    Get full text
    Article
  8. 8

    Diversity of controllable anonymous communication system by Yan-wei ZHOU, Zhen-qiang WU, Bo YANG

    Published 2015-06-01
    Subjects: “…anonymous communication system…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Trusted and anonymous authentication scheme for wireless networks by YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2

    Published 2009-01-01
    “…A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.…”
    Get full text
    Article
  16. 16

    Survey of network-layer anonymous communication protocols by Liangmin WANG, Xiaoling NI, Hui ZHAO

    Published 2020-02-01
    Subjects: “…anonymous communication…”
    Get full text
    Article
  17. 17
  18. 18

    Unclonable dynamic k-times anonymous authentication by Xin LIU, Qiu-liang XU

    Published 2012-07-01
    Subjects: “…k-times anonymous authentication…”
    Get full text
    Article
  19. 19

    Fictional Marriage Proposal of Anonymous Astrakhan Khan by Roman Hautala

    Published 2017-03-01
    “…Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven) hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. …”
    Get full text
    Article
  20. 20