Search

Your search keyword '"identity privacy"' showing total 42 results

Search Constraints

Start Over You searched for: Descriptor "identity privacy" Remove constraint Descriptor: "identity privacy" Topic business.industry Remove constraint Topic: business.industry
42 results on '"identity privacy"'

Search Results

1. Location-sharing protocol for privacy protection in mobile online social networks

2. Efficient Lattice-Based Ring Signature for Message Authentication in VANETs

3. Public Auditing Scheme With Identity Privacy Preserving Based on Certificateless Ring Signature for Wireless Body Area Networks

4. Recent Advances and Challenges in Security and Privacy for V2X Communications

6. A Review of Selected Proposals for Improving Identity Privacy in UMTS

7. Trust, Identity, Privacy, and Security Considerations For Designing a Peer Data Sharing Platform Between People Living With HIV

8. Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

9. Two-Stage Privacy-Preserving Mechanism for a Crowdsensing-Based VSN

10. Enhancing Data Privacy in the Internet of Things (IoT) using Edge Computing

11. Privacy protection in mobile crowd sensing: a survey

12. Privacy Aware Incentivization for Participatory Sensing

15. Analysis of User Identity Privacy in LTE and Proposed Solution

16. Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data

18. Data Portraits: Identity, Privacy, and Surveillance

19. Defeating the Downgrade Attack on Identity Privacy in 5G

20. BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy

21. Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem

22. SDN-Based Secure Localization in Heterogeneous WSN

23. Data Sharing Securely for Administrators of Dynamic Groups in Cloud

24. Identity privacy preserving biometric based authentication scheme for Naked healthcare environment

25. Research on multi-user encrypted search scheme in cloud environment

26. Anonymous authentication scheme in e-Health Cloud environment

27. TripSense: a trust-based vehicular platoon crowdsensing scheme with privacy preservation in VANETs

28. A New Trust Model for Improved Identity Privacy in Cellular Networks

29. A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments

30. Controllable face privacy

32. Security in emerging 4G networks

33. It and Privacy from an Ethical Perspective Digital Whoness: Identity, Privacy and Freedom in the Cyberworld171

34. A group-oriented secure multiagent platform

35. Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

36. Generic Constructions of Biometric Identity Based Encryption Systems

37. Identity, privacy and security challenges with Ontario's enhanced driver's licence

38. Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security

39. Tailoring authentication protocols to match underlying mechanisms

40. Mind—body identity, privacy and categories

41. An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics

42. The cyber trust tension in E-government: Balancing identity, privacy, security

Catalog

Books, media, physical & digital resources