Search

Your search keyword '"identity privacy"' showing total 155 results

Search Constraints

Start Over You searched for: Descriptor "identity privacy" Remove constraint Descriptor: "identity privacy"
155 results on '"identity privacy"'

Search Results

1. Privacy preserving spatio-temporal attribute-based encryption for cloud applications.

3. Anonymous whistleblowers reply scheme based on secret sharing

4. Survey on Identity Authentication in Metaverse Environment.

6. Introduction

8. CIM: CP-ABE-based identity management framework for collaborative edge storage.

9. Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network

11. An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT).

12. BIPP: Blockchain-Based Identity Privacy Protection Scheme in Internet of Vehicles for Remote Anonymous Communication

13. Research on identity authentication system of Internet of Things based on blockchain technology

14. Privacy-Aware Access Protocols for MEC Applications in 5G

15. Identity-Based Identity-Concealed Authenticated Key Exchange

16. A remote attestation mechanism using group signature for the perception layer in centralized networking

17. Research on identity authentication system of Internet of Things based on blockchain technology.

18. Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain.

20. Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.

21. IPSadas: Identity‐privacy‐aware secure and anonymous data aggregation scheme.

22. Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy.

23. A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain.

24. Privacy-Aware Access Protocols for MEC Applications in 5G †.

25. Cryptanalysis on an organization-friendly blockchain system.

26. A remote attestation mechanism using group signature for the perception layer in centralized networking.

27. A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.

28. Identity-Based Proofs of Storage with Enhanced Privacy

29. Defeating the Downgrade Attack on Identity Privacy in 5G

30. Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

31. IMSI-based Routing and Identity Privacy in 5G

32. An Information-Aware Privacy-Preserving Accelerometer Data Sharing

33. Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing.

34. 一种混合云环境下安全高效的群数据共享方法.

35. Privacy-Preserving Cloud Auditing with Multiple Uploaders

36. Two-Stage Privacy-Preserving Mechanism for a Crowdsensing-Based VSN

37. A New Public Remote Integrity Checking Scheme with User Privacy

38. Privacy protection in mobile crowd sensing: a survey.

39. Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET.

40. Threshold privacy-preserving cloud auditing with multiple uploaders.

41. An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.

42. Privacy-Preserved Federated Learning for Autonomous Driving

43. Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data

44. Lightweight integrity verification scheme for cloud based group data

47. Security Notions of Biometric Remote Authentication Revisited

48. A Survey on Privacy Problems and Solutions for VANET Based on Network Model

49. Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

50. A New Approach for Biometric Template Storage and Remote Authentication

Catalog

Books, media, physical & digital resources