Search

Showing total 1,401 results

Search Constraints

Start Over You searched for: Topic anonymity Remove constraint Topic: anonymity Publisher ieee Remove constraint Publisher: ieee
1,401 results

Search Results

1. A Blockchain-based File-sharing System for Academic Paper Review

2. Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)

3. (Short Paper) Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol

4. Machine learning for anonymous traffic detection and classification

5. A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid.

6. Algorithmic advances in anonymous communication over networks

7. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.

8. Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks.

9. Privacy and Transparency in CBDCs: A Regulation-by-Design AML/CFT Scheme.

10. Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review.

11. Nationality and Geolocation-Based Profiling in the Dark(Web).

12. Perfect Anonymity.

13. Physical Layer Anonymous Precoding Design: From the Perspective of Anonymity Entropy.

14. Untraceable Sensor Movement in Distributed IoT Infrastructure.

15. VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.

16. Novel Anonymous Key Establishment Protocol for Isolated Smart Meters.

17. Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems.

18. Efficient and Anonymous Authentication With Succinct Multi-Subscription Credential in SAGVN.

19. Secure Key Agreement and Key Protection for Mobile Device User Authentication.

20. Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff.

21. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.

22. Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps.

23. Reliable Cooperative Authentication for Vehicular Networks.

24. Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc Networks.

25. Anonymity and Transferability for an Electronic Bank Check Scheme.

26. Efficient Anonymous Communication in SDN-Based Data Center Networks.

27. K-Anonymity for Crowdsourcing Database.

28. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization.

29. Accuracy-Constrained Privacy-Preserving Access Control Mechanismfor Relational Data.

30. A Privacy-Preserving Mobile Payment System for Mass Transit.

31. FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control.

32. Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks.

33. Design of Pool Mixes Against Profiling Attacks in Real Conditions.

34. Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks.

35. Service-Oriented Architecture for High-Dimensional Private Data Mashup.

36. Correlation-Based Traffic Analysis Attacks on Anonymity Networks.

37. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.

38. Blend-In: A Privacy-Enhancing Certificate-Selection Method for Vehicular Communication.

39. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks.

40. Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks.

41. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.

42. Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.

43. An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks.

44. Anonymizing Collections of Tree-Structured Data.

45. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.

46. Anonymity of Memory-Limited Chaum Mixes Under Timing Analysis: An Information Theoretic Perspective.

47. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol.

48. On the use of distributed relays to increase base station anonymity in Wireless Sensor Networks.

49. A security query protocol of ONS in EPC system.

50. Polynomial algorithms to check opacity in discrete event systems.