Suggested Topics within your search.
Suggested Topics within your search.
-
101
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01Subjects: Get full text
Article -
102
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. …”
Get full text
Article -
103
Anonymous aggregator election protocol for wireless sensor networks
Published 2015-02-01Subjects: Get full text
Article -
104
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01“…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
Get full text
Article -
105
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: Get full text
Article -
106
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01Subjects: “…Anonymous reputation system…”
Get full text
Article -
107
Polish Books Printed Anonymously in Eary Modern Toruń
Published 2024-11-01Subjects: “…typographic anonyms…”
Get full text
Article -
108
Donor anonymity: national legal regulation and international experience
Published 2020-10-01Subjects: “…principle of anonymity…”
Get full text
Article -
109
Differentially private data release based on clustering anonymization
Published 2016-05-01Subjects: Get full text
Article -
110
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
111
Anonim véleménynyilvánítás az interneten (Anonymous speech on the Internet)
Published 2014-12-01Get full text
Article -
112
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: “…anonymous revocation…”
Get full text
Article -
113
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
114
Poétique du cratylisme et identité culturelle dans Monnè, outrages et défis d’Ahmadou Kourouma
Published 2024-06-01Subjects: Get full text
Article -
115
Quand le risque industriel est synonyme de dynamiques urbaines
Published 2014-11-01Get full text
Article -
116
Fit for purpose testing and independent GMP validation of the monocyte activation test
Published 2025-01-01“…The present study describes the “fit for purpose” testing and the independent product-specific GMP validation of the monocyte activation test (MAT) to detect pyrogenic and pro-inflammatory contaminants, MAT Method A, Quantitative Test (European Pharmacopoeia, Ph. …”
Get full text
Article -
117
Investigating human monocyte adhesion, migration and transmigration and their modulation by Zika virus
Published 2024-12-01“…Human circulating monocytes are established targets for Zika virus (ZIKV) infection. …”
Get full text
Article -
118
Intermediate monocytes in blood correlate with subclinical vascular changes in lupus nephritis
Published 2025-02-01Get full text
Article -
119
The Origin of Metonymical Combination (Derafshi Shodan/Kardan) Based on Ferdowsi's Shahnameh
Published 2024-09-01Get full text
Article -
120
“Omics” Signatures in Peripheral Monocytes from Women with Low BMD Condition
Published 2018-01-01“…The molecules in monocytes that are deregulated in low BMD condition may contribute to processes such as monocyte survival, migration/chemotaxis, adhesion, transendothelial migration, and differentiation into the osteoclast lineage. …”
Get full text
Article