Search

Your search keyword '"Anonymity"' showing total 21,250 results

Search Constraints

Start Over You searched for: Descriptor "Anonymity" Remove constraint Descriptor: "Anonymity"
21,250 results on '"Anonymity"'

Search Results

1. A Small Clue Made of Fragmented Pieces.

2. Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity.

3. Anonymity on Byzantine-Resilient Decentralized Computing

4. On Distributed Computing: A View, Physical Versus Logical Objects, and a Look at Fully Anonymous Systems

5. LARMix: Latency-Aware Routing in Mix Networks with Free Routes Topology

6. On the Anonymity of Linkable Ring Signatures

7. Ethical practice in participant-centred linguistic research.

8. Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature.

9. A board of one's own: Interviewing the anonymous female imageboard community.

10. Unpacking news engagement through the perceived affordances of social media: A cross-platform, cross-country approach.

11. Transaction graph based key node identification for blockchain regulation.

12. Mechanisms and axiomatics for division problems with single-dipped preferences.

13. BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics.

14. Each counts for one.

15. Providing Delayed, In-Person Collected Feedback From Residents to Teaching Faculty: Lessons Learned.

16. Lyric Anonymity: Songs of Love and Pastoral Care in Lambeth 853.

17. Blockchain-based group signature for secure authentication of IoT systems in smart home environments.

18. "Your History is Being Worked Up": Microfiction in the Age of the Fourth Industrial Revolution.

19. Anonymous Gamete Donation: a Case for Balancing Under Article 8 ECHR.

20. Maria: Eine Geschichte in Briefen: Ein Spiel herausgeberischer Simulationen?

21. In Her Own Hand: Female Agency around 1800.

22. Anonymous Access System with Limited Number of Uses in a Trustless Environment.

23. Information security for criminological ethnographers.

24. An anonymous broadcasting system with accountability based on group signatures.

25. How to be not economic: abundance and the history of strolling.

26. From meme-making trolls to feminist artists: digital feminist art activism in contemporary South Korea.

27. Manipulable, reversible and diversified de-identification via face identity disentanglement.

28. Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid.

29. A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof.

30. Service Members' Attitudes Toward Reporting Hazing Incidents.

31. Teacher and leader research: The ethics of researching your own practice.

32. Undoing slavery's anonymity: The politics of identification in twenty-first century Black Canadian poetry.

33. Oocyte donors' experience and expectations in a non-profit fertility care setting.

34. Response to Focus Issue.

35. Authorship and Accountability: Kierkegaard and Anonymity in the Press.

36. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval.

37. The definition of assertion: Commitment and truth.

38. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

39. Digital Confessions: The Willingness to Disclose Intimate Information to a Chatbot and its Impact on Emotional Well-Being.

40. وب پنهان و حق گمنامی از منظر حقوق بین الملل بشر.

41. Dynamic group fuzzy extractor.

42. Examining the escalation of hostility in social media: a comparative analysis of online incivility in China and the United States regarding the Russia–Ukraine war.

43. Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems.

44. Proxy re-signature scheme with cryptographic reverse firewall for medical data security.

45. A secure user authentication scheme for crypto-wallet in IoT environment.

46. Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid.

47. False-name-proof and strategy-proof voting rules under separable preferences.

48. AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS.

49. Dynamic group fuzzy extractor

50. A comprehensive review of cancelable biometrics for cybersecurity solutions.

Catalog

Books, media, physical & digital resources