-
1
-
2
L’identification des anonymes
Published 2022-10-01“…Analysis of the victimology of those who lose their identity, and of the administrative and medical management of their situation, reveals institutional strategies for invisibilising or giving visibility to bodies and anonymous cases. Missing persons and unidentified bodies become revealers of social discrimination logics that transcend the life and death of numerous individuals in India. …”
Get full text
Article -
3
Anonymous Bodies? The Process of Disciplining in Tuberculosis Sanatoriums
Published 2021-09-01Get full text
Article -
4
-
5
Comparison of anonymization techniques regarding statistical reproducibility.
Published 2025-02-01“…<h4>Background</h4>Anonymization opens up innovative ways of using secondary data without the requirements of the GDPR, as anonymized data does not affect anymore the privacy of data subjects. …”
Get full text
Article -
6
An Architecture for Anonymous Mobile Coupons in a Large Network
Published 2016-01-01Get full text
Article -
7
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments
Published 2015-11-01“…An authentication scheme with anonymity in mobility networks was proposed recently. …”
Get full text
Article -
8
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. …”
Get full text
Article -
9
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: Get full text
Article -
10
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01Subjects: “…Anonymous reputation system…”
Get full text
Article -
11
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
Published 2011-10-01Get full text
Article -
12
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. …”
Get full text
Article -
13
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. …”
Get full text
Article -
14
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Published 2016-01-01“…A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. …”
Get full text
Article -
15
Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks
Published 2009-01-01Get full text
Article -
16
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. The operations in our scheme only include a small number of communication phases and protect the identities of the entities involved (i.e. stakeholders and end-nodes) from any outside entity. …”
Get full text
Article -
17
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: “…anonymity…”
Get full text
Article -
18
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Anonymity is an important concern in wireless communications. …”
Get full text
Article -
19
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required. Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city. …”
Get full text
Article -
20
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. …”
Get full text
Article