Search

Your search keyword '"Anonymity"' showing total 8,130 results

Search Constraints

Start Over You searched for: Descriptor "Anonymity" Remove constraint Descriptor: "Anonymity" Language english Remove constraint Language: english
8,130 results on '"Anonymity"'

Search Results

1. A Small Clue Made of Fragmented Pieces.

2. Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity.

3. Ethical practice in participant-centred linguistic research.

4. Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature.

5. A board of one's own: Interviewing the anonymous female imageboard community.

6. Unpacking news engagement through the perceived affordances of social media: A cross-platform, cross-country approach.

7. Transaction graph based key node identification for blockchain regulation.

8. Mechanisms and axiomatics for division problems with single-dipped preferences.

9. BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics.

10. Each counts for one.

11. Providing Delayed, In-Person Collected Feedback From Residents to Teaching Faculty: Lessons Learned.

12. Lyric Anonymity: Songs of Love and Pastoral Care in Lambeth 853.

13. Blockchain-based group signature for secure authentication of IoT systems in smart home environments.

14. "Your History is Being Worked Up": Microfiction in the Age of the Fourth Industrial Revolution.

15. Anonymous Gamete Donation: a Case for Balancing Under Article 8 ECHR.

16. Maria: Eine Geschichte in Briefen: Ein Spiel herausgeberischer Simulationen?

17. In Her Own Hand: Female Agency around 1800.

18. Anonymous Access System with Limited Number of Uses in a Trustless Environment.

19. Information security for criminological ethnographers.

20. An anonymous broadcasting system with accountability based on group signatures.

21. How to be not economic: abundance and the history of strolling.

22. From meme-making trolls to feminist artists: digital feminist art activism in contemporary South Korea.

23. Manipulable, reversible and diversified de-identification via face identity disentanglement.

24. Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid.

25. A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof.

26. Service Members' Attitudes Toward Reporting Hazing Incidents.

27. Teacher and leader research: The ethics of researching your own practice.

28. Undoing slavery's anonymity: The politics of identification in twenty-first century Black Canadian poetry.

29. Oocyte donors' experience and expectations in a non-profit fertility care setting.

30. Response to Focus Issue.

31. Authorship and Accountability: Kierkegaard and Anonymity in the Press.

32. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval.

33. The definition of assertion: Commitment and truth.

34. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

35. Digital Confessions: The Willingness to Disclose Intimate Information to a Chatbot and its Impact on Emotional Well-Being.

36. Dynamic group fuzzy extractor.

37. Examining the escalation of hostility in social media: a comparative analysis of online incivility in China and the United States regarding the Russia–Ukraine war.

38. Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems.

39. Proxy re-signature scheme with cryptographic reverse firewall for medical data security.

40. A secure user authentication scheme for crypto-wallet in IoT environment.

41. Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid.

42. False-name-proof and strategy-proof voting rules under separable preferences.

43. AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS.

44. Dynamic group fuzzy extractor

45. A comprehensive review of cancelable biometrics for cybersecurity solutions.

46. ORIGIN STORY.

47. Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology.

48. Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device.

49. ABC(T)-graphs: An axiomatic characterization of the median procedure in graphs with connected and G[formula omitted]-connected medians.

50. Composing Cultural Connections: Exploring Tensions of Creating Composite Ethnodramatic Characters.

Catalog

Books, media, physical & digital resources