Search

Your search keyword '"identity privacy"' showing total 78 results

Search Constraints

Start Over You searched for: Descriptor "identity privacy" Remove constraint Descriptor: "identity privacy" Language english Remove constraint Language: english
78 results on '"identity privacy"'

Search Results

1. Privacy preserving spatio-temporal attribute-based encryption for cloud applications.

3. CIM: CP-ABE-based identity management framework for collaborative edge storage.

4. Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network

5. An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT).

6. Research on identity authentication system of Internet of Things based on blockchain technology

7. Privacy-Aware Access Protocols for MEC Applications in 5G

8. A remote attestation mechanism using group signature for the perception layer in centralized networking

9. Research on identity authentication system of Internet of Things based on blockchain technology.

10. Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain.

11. Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.

12. IPSadas: Identity‐privacy‐aware secure and anonymous data aggregation scheme.

13. Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy.

14. A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain.

15. Privacy-Aware Access Protocols for MEC Applications in 5G †.

16. Cryptanalysis on an organization-friendly blockchain system.

17. A remote attestation mechanism using group signature for the perception layer in centralized networking.

18. A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.

19. Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

20. IMSI-based Routing and Identity Privacy in 5G

21. Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing.

22. Two-Stage Privacy-Preserving Mechanism for a Crowdsensing-Based VSN

23. Privacy protection in mobile crowd sensing: a survey.

24. Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET.

25. Threshold privacy-preserving cloud auditing with multiple uploaders.

26. An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.

27. Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data

28. Privacy Aware Incentivization for Participatory Sensing

29. Location-sharing protocol for privacy protection in mobile online social networks

30. Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems.

31. Efficient chameleon hashing-based privacy-preserving auditing in cloud storage.

32. Recent Advances and Challenges in Security and Privacy for V2X Communications

33. Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.

34. A New Approach for Biometric Template Storage and Remote Authentication.

35. Privacy Preserving Biometric Authentication on the blockchain for smart healthcare.

36. Preserving identity privacy on multi-owner cloud data during public verification.

37. Identity privacy-based reliable routing method in VANETs.

38. An Efficient User Revocation and Encryption Methods for Secure Multi-Owner Data Sharing to Dynamic Groups in the Cloud.

39. Trust, Identity, Privacy, and Security Considerations For Designing a Peer Data Sharing Platform Between People Living With HIV

40. Russian Internet Research Agency Disinformation Activities on Tumblr: Identity, Privacy, and Ambivalence

41. IMSI-based Routing and Identity Privacy in 5G

42. Two-Stage Privacy-Preserving Mechanism for a Crowdsensing-Based VSN

43. Enhancing Data Privacy in the Internet of Things (IoT) using Edge Computing

44. Privacy protection in mobile crowd sensing: a survey

45. Defeating the Downgrade Attack on Identity Privacy in 5G

46. ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing.

48. TripSense: a trust-based vehicular platoon crowdsensing scheme with privacy preservation in VANETs

49. Privacy Aware Incentivization for Participatory Sensing.

50. Women with Dementia and their handbags: Negotiating identity, privacy and 'home' through material culture

Catalog

Books, media, physical & digital resources