Academic literature on the topic 'Anonymous channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anonymous channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anonymous channel"
Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.
Full textUtami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.
Full textMiceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.
Full textTriantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.
Full textJuang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.
Full textNurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.
Full textAldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.
Full textHwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.
Full textBanerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.
Full textCiobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.
Full textDissertations / Theses on the topic "Anonymous channel"
Garcia, Eugene Lemuel R. "Bitcoin Transaction Tracing and Purchasing Behavior Characterization of Online Anonymous Marketplaces Using Side Channels." Research Showcase @ CMU, 2017. http://repository.cmu.edu/theses/128.
Full textLi, Song. "Covert channels and anonymous communication in ad hoc networks." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7418.
Full textThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Хома, Любава Віталіївна. "Дослiдження криптографiчних протоколiв електронного голосування." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44250.
Full textThis work consists of 45 pages, includes 4 illustrations, 9 tables and 10 literature references. The aim of this qualification work is to review existing e-voting systems, to compare their capabilities and criteria, which meet in full, in part. Select the electronic voting system for which the modification will be proposed. The object of the work is electronic voting systems and cryptographic protocols of e-voting. The subject of the work is mathematical models and algorithms of evoting protocols. A review of various electronic voting systems has been performed. Based on the results of a comparative analysis of existing electronic voting schemes, modification that simplifies the system of electronic elections in terms of speed and amount of memory required. For the possibility of using low-power equipment.
Lee, Jing-Feng, and 李景逢. "A wireless-based authentication and anonymous channels for GSM system." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/23888697503819776777.
Full text淡江大學
資訊工程學系
90
For mobile roaming environment, the mobile uses visiting network’s services, the mobile station and the visiting network must authenticate each other. We propose a new authentication and anonymous channels protocol for roaming mobile. Our scheme can secure applied to GSM and CDPD wireless communication system, it not only supporting the mobile anonymity but also resolving the charging problem. The mobile station only takes 1Tmul + 1Tadd computation time in roaming mobile roaming environment.
Ilivitsky, Susan. "Making sense of sudden personal transformation: a qualitative study on people’s beliefs about the facilitative factors and mechanisms of their abrupt and profound inner change." Thesis, 2011. http://hdl.handle.net/1828/3383.
Full textGraduate
Books on the topic "Anonymous channel"
Changed lives: The story of Alcoholics Anonymous. Minneapolis: Augsburg, 1991.
Find full textNicolas, Danet, ed. Anonymous: Pirates informatiques ou altermondialistes numériques? : peuvent-ils changer le monde? [Limoges]: FYP éditions, 2011.
Find full textRoom, Adrian. A dictionary of pseudonyms and their origins, with stories of name changes. Jefferson, N.C: McFarland, 1989.
Find full textA dictionary of pseudonyms and their origins, with stories of name changes. Chicago: St James Press, 1989.
Find full textJurczyszyn, Lukasz, Jacek Koltan, Pawel Kuczynski, and Mikolaj Rakusa-Suszczewski, eds. Obywatele ACTA. Gdansk, Poland: European Solidarity Centre, 2014.
Find full textBeuningen, Cor, and Kees Buitendijk, eds. Finance and the Common Good. NL Amsterdam: Amsterdam University Press, 2019. http://dx.doi.org/10.5117/9789463727914.
Full textMorreim, Dennis C. Changed Lives: The Story of Alcoholics Anonymous. Augsburg Fortress Pub, 1992.
Find full textGroom, Nick. Draining the Irish Sea. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198795155.003.0002.
Full textDuval-Hernández, Robert, Gary S. Fields, and George H. Jakubson. Analysing income distribution changes: Anonymous versus panel income approaches. UNU-WIDER, 2015. http://dx.doi.org/10.35188/unu-wider/2015/911-4.
Full textRichards, Emilie. Somewhere Between Luck and Trust (Goddesses Anonymous). MIRA, 2013.
Find full textBook chapters on the topic "Anonymous channel"
Ogata, Wakaha, Kaoru Kurosawa, Kazue Sako, and Kazunori Takatani. "Fault tolerant anonymous channel." In Information and Communications Security, 440–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028500.
Full textPfitzmann, Birgit. "Breaking an efficient anonymous channel." In Advances in Cryptology — EUROCRYPT'94, 332–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053448.
Full textTóth, Gergely, and Zoltán Hornák. "The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication." In Security and Privacy in Dynamic Environments, 483–92. Boston, MA: Springer US, 2006. http://dx.doi.org/10.1007/0-387-33406-8_45.
Full textTian, Yangguang, Yingjiu Li, Binanda Sengupta, Nan Li, and Yong Yu. "Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion." In Cryptology and Network Security, 512–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_28.
Full textTripathy, Somanath, and Susil Kumar Mohanty. "MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network." In Financial Cryptography and Data Security, 481–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_34.
Full textKonorski, Jerzy. "Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations." In Distributed Computing – IWDC 2005, 262–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11603771_29.
Full textDanezis, George, and Emilia Käsper. "The Dangers of Composing Anonymous Channels." In Information Hiding, 191–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36373-3_13.
Full textDas, Anupam, and Nikita Borisov. "Securing Anonymous Communication Channels under the Selective DoS Attack." In Financial Cryptography and Data Security, 362–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_31.
Full textCotticelli, Francesco. "Burladores e Convitati a Napoli tra Sei e Settecento, da Perrucci ad Abri (e oltre)." In Studi e saggi, 219–35. Florence: Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-150-1.14.
Full textKoenig, Reto E., Lukas Laederach, and Cédric von Allmen. "How to Authenticate MQTT Sessions Without Channel and Broker Security." In Applied Approach to Privacy and Security for the Internet of Things, 129–38. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2444-2.ch006.
Full textConference papers on the topic "Anonymous channel"
Garay, Juan A., Clinton Givens, Rafail Ostrovsky, and Pavel Raykov. "Fast and unconditionally secure anonymous channel." In the 2014 ACM symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611462.2611494.
Full textEmura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Building secure and anonymous communication channel." In SAC 2014: Symposium on Applied Computing. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2554850.2554879.
Full textKosugi, Tomoaki, Tomoki Hayafuji, and Masahiro Mambo. "On the Traceability of the Accountable Anonymous Channel." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.29.
Full textSu, Li, Muxiang Yang, Jun Li, and Guohua Cui. "Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments." In 2006 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2006. http://dx.doi.org/10.1109/wicom.2006.202.
Full textGuan, Zhenyu, Lixin Zhang, Yingpeng Zhang, Dawei Li, Yu Sun, and Jian Cui. "Off-chain Anonymous Payment Channel Scheme based on Mimblewimble." In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, 2021. http://dx.doi.org/10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00198.
Full textTriantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "Towards an anonymous incident communication channel for electric smart grids." In PCI '18: 22nd Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3291533.3291559.
Full textTairi, Erkan, Pedro Moreno-Sanchez, and Matteo Maffei. "A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs." In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. http://dx.doi.org/10.1109/sp40001.2021.00111.
Full textBraeken, An, and Abdellah Touhafi. "Efficient anonymous user authentication on server without secure channel during registration." In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). IEEE, 2016. http://dx.doi.org/10.1109/cloudtech.2016.7847702.
Full textZhou, Xuanwu, Xiaoyuan Yang, Ping Wei, and Yupu Hu. "An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem." In 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design. IEEE, 2006. http://dx.doi.org/10.1109/caidcd.2006.329336.
Full textWang, Z., J. Deng, and R. B. Lee. "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.315.
Full textReports on the topic "Anonymous channel"
Moskowitz, Ira S., Richard E. Newman, and Paul F. Syverson. Quasi-Anonymous Channels. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada465128.
Full textBrown, Candace, Chudney Williams, Ryan Stephens, Jacqueline Sharp, Bobby Bellflower, and Martinus Zeeman. Medicated-Assisted Treatment and 12-Step Programs: Evaluating the Referral Process. University of Tennessee Health Science Center, November 2021. http://dx.doi.org/10.21007/con.dnp.2021.0013.
Full text