Suggested Topics within your search.
Suggested Topics within your search.
-
1
Online trace anonymization based on anonymous flow table
Published 2016-11-01Subjects: “…network trace anonymization…”
Get full text
Article -
2
-
3
-
4
-
5
L’identification des anonymes
Published 2022-10-01“…Analysis of the victimology of those who lose their identity, and of the administrative and medical management of their situation, reveals institutional strategies for invisibilising or giving visibility to bodies and anonymous cases. Missing persons and unidentified bodies become revealers of social discrimination logics that transcend the life and death of numerous individuals in India. …”
Get full text
Article -
6
-
7
Anonymous survey system based on NIZK
Published 2016-12-01Subjects: “…anonymous electronic survey…”
Get full text
Article -
8
Diversity of controllable anonymous communication system
Published 2015-06-01Subjects: “…anonymous communication system…”
Get full text
Article -
9
-
10
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
11
Trajectories anonymous algorithm for association attack
Published 2017-06-01Subjects: Get full text
Article -
12
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
13
Anonymous Bodies? The Process of Disciplining in Tuberculosis Sanatoriums
Published 2021-09-01Get full text
Article -
14
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01Subjects: Get full text
Article -
15
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01“…A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.…”
Get full text
Article -
16
Survey of network-layer anonymous communication protocols
Published 2020-02-01Subjects: “…anonymous communication…”
Get full text
Article -
17
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: Get full text
Article -
18
Unclonable dynamic k-times anonymous authentication
Published 2012-07-01Subjects: “…k-times anonymous authentication…”
Get full text
Article -
19
Fictional Marriage Proposal of Anonymous Astrakhan Khan
Published 2017-03-01“…Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven) hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. …”
Get full text
Article -
20