Journal articles on the topic 'Anonymous channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Anonymous channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.
Full textUtami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.
Full textMiceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.
Full textTriantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.
Full textJuang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.
Full textNurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.
Full textAldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.
Full textHwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.
Full textBanerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.
Full textCiobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.
Full textHURZHI, S. "The current threatening trends in the use of Telegram channels to the damage of state interests." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 162–69. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249297.
Full textPang, Liaojun, Man Kou, Mengmeng Wei, and Huixian Li. "Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel." IEEE Access 7 (2019): 84091–106. http://dx.doi.org/10.1109/access.2019.2924654.
Full textJohansson, Elka, and Peter Carey. "Detecting Fraud: The Role of the Anonymous Reporting Channel." Journal of Business Ethics 139, no. 2 (May 8, 2015): 391–409. http://dx.doi.org/10.1007/s10551-015-2673-6.
Full textAdil, Muhammad, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, and Omar Almomani. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8 (April 18, 2020): 2311. http://dx.doi.org/10.3390/s20082311.
Full textMao, Chang M., and David C. DeAndrea. "How Anonymity and Visibility Affordances Influence Employees’ Decisions About Voicing Workplace Concerns." Management Communication Quarterly 33, no. 2 (November 25, 2018): 160–88. http://dx.doi.org/10.1177/0893318918813202.
Full textBOUDA, JAN, and JOSEF ŠPROJCAR. "QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY." International Journal of Quantum Information 09, no. 02 (March 2011): 651–63. http://dx.doi.org/10.1142/s0219749911007691.
Full textShi, Leyi, Yuxiao Song, Zhiyu Xue, Yihao Liu, and Honglong Chen. "SACT: A New Model of Covert Communication Based on SDN." Sensors 20, no. 24 (December 19, 2020): 7300. http://dx.doi.org/10.3390/s20247300.
Full textBarbancho, A. M., and A. Peinado. "Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications." Computer Networks 43, no. 6 (December 2003): 777–85. http://dx.doi.org/10.1016/s1389-1286(03)00318-9.
Full textYang, Chou-Chen, Yuan-Liang Tang, Ren-Chiun Wang, and Hung-Wen Yang. "A secure and efficient authentication protocol for anonymous channel in wireless communications." Applied Mathematics and Computation 169, no. 2 (October 2005): 1431–39. http://dx.doi.org/10.1016/j.amc.2004.10.073.
Full textLi, Xie, and Ren Yanli. "Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles." International Journal of Digital Crime and Forensics 6, no. 2 (April 2014): 40–51. http://dx.doi.org/10.4018/ijdcf.2014040103.
Full textEmura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation." Journal of Information Security and Applications 34 (June 2017): 84–91. http://dx.doi.org/10.1016/j.jisa.2016.12.001.
Full textŠPROJCAR, JOSEF. "PROPOSAL OF A SEMIFORMAL MODEL OF ANONYMOUS COMMUNICATION." International Journal of Foundations of Computer Science 20, no. 03 (June 2009): 523–48. http://dx.doi.org/10.1142/s0129054109006711.
Full textWalters, W. Patrick, and Jürgen Bajorath. "On the evolving open peer review culture for chemical information science." F1000Research 4 (November 25, 2015): 1350. http://dx.doi.org/10.12688/f1000research.7460.1.
Full textKaigo, Muneo. "Internet Aggregators Constructing the Political Right Wing in Japan." JeDEM - eJournal of eDemocracy and Open Government 5, no. 1 (November 20, 2013): 59–79. http://dx.doi.org/10.29379/jedem.v5i1.184.
Full textBanerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.087392.
Full textBanerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.10007999.
Full textLee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications." Security and Communication Networks 5, no. 12 (February 29, 2012): 1375–78. http://dx.doi.org/10.1002/sec.430.
Full textNoor, Fazal, Turki A. Kordy, Ahmad B. Alkhodre, Oussama Benrhouma, Adnan Nadeem, and Ali Alzahrani. "Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption." Wireless Communications and Mobile Computing 2021 (October 7, 2021): 1–14. http://dx.doi.org/10.1155/2021/5986469.
Full textSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Full textMo, Jiaqing, Wei Shen, and Weisheng Pan. "An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems." Wireless Communications and Mobile Computing 2020 (April 23, 2020): 1–13. http://dx.doi.org/10.1155/2020/5686498.
Full textBumann, Dirk, and Jens Krause. "Front Individuals Lead in Shoals of Three-Spined Sticklebacks (Gasterosteus Aculeatus) and Juvenile Roach (Rutilus Rutilus)." Behaviour 125, no. 3-4 (1993): 189–98. http://dx.doi.org/10.1163/156853993x00236.
Full textHuang, Jin, Bo Xu, and Kun Qiu. "Modeling and Simulation of FC-AE-ASM Network." Advanced Materials Research 748 (August 2013): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amr.748.941.
Full textZhang, Jian, Kurt Pany, and Philip M. J. Reckers. "Under Which Conditions are Whistleblowing “Best Practices” Best?" AUDITING: A Journal of Practice & Theory 32, no. 3 (March 1, 2013): 171–81. http://dx.doi.org/10.2308/ajpt-50451.
Full textZuckerman, Inon, Dor Mizrahi, and Ilan Laufer. "EEG Pattern Classification of Picking and Coordination Using Anonymous Random Walks." Algorithms 15, no. 4 (March 26, 2022): 114. http://dx.doi.org/10.3390/a15040114.
Full textCroes, Emmelyn A. J., Marjolijn L. Antheunis, Alexander P. Schouten, Emiel J. Krahmer, and Daniëlle N. M. Bleize. "The effect of interaction topic and social ties on media choice and the role of four underlying mechanisms." Communications 43, no. 1 (March 26, 2018): 47–73. http://dx.doi.org/10.1515/commun-2017-0046.
Full textChang, Ya-Fen, Wei-Liang Tai, Po-Lin Hou, and Kuan-Yu Lai. "A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments." Symmetry 13, no. 7 (June 23, 2021): 1121. http://dx.doi.org/10.3390/sym13071121.
Full textZhang, Junsong, Qikun Zhang, Zhigang Li, Xianling Lu, and Yong Gan. "A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (July 22, 2021): 1–11. http://dx.doi.org/10.1155/2021/4939589.
Full textUllah, Insaf, Muhammad Asghar Khan, Mohammed H. Alsharif, and Rosdiadee Nordin. "An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles." Sustainability 13, no. 19 (September 30, 2021): 10891. http://dx.doi.org/10.3390/su131910891.
Full textRobertson, Jesse C., Chad M. Stefaniak, and Mary B. Curtis. "Does Wrongdoer Reputation Matter? Impact of Auditor-Wrongdoer Performance and Likeability Reputations on Fellow Auditors' Intention to Take Action and Choice of Reporting Outlet." Behavioral Research in Accounting 23, no. 2 (November 1, 2011): 207–34. http://dx.doi.org/10.2308/bria-50022.
Full textNoether, Shen, Adam Mackenzie, and The Monero Research Lab. "Ring Confidential Transactions." Ledger 1 (December 21, 2016): 1–18. http://dx.doi.org/10.5195/ledger.2016.34.
Full textGuo, Junyan, and Ye Du. "A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network." Security and Communication Networks 2020 (August 25, 2020): 1–12. http://dx.doi.org/10.1155/2020/5167832.
Full textFisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.
Full textFisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.
Full textLee, Misuk. "Will this search end up with booking? Modeling airline booking conversion of anonymous visitors." Journal of Tourism Analysis: Revista de Análisis Turístico 27, no. 2 (July 3, 2020): 237–50. http://dx.doi.org/10.1108/jta-11-2019-0038.
Full textOrús, Carlos, Raquel Gurrea, and Sergio Ibáñez-Sánchez. "The impact of consumers’ positive online recommendations on the omnichannel webrooming experience." Spanish Journal of Marketing - ESIC 23, no. 3 (December 2, 2019): 397–414. http://dx.doi.org/10.1108/sjme-08-2019-0067.
Full textKaplan, Steven E., and Joseph J. Schultz. "Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting." Journal of Business Ethics 71, no. 2 (January 25, 2007): 109–24. http://dx.doi.org/10.1007/s10551-006-0021-6.
Full textSattar, Zina. "A Practical E-Test System." International Journal of Emerging Technologies in Learning (iJET) 14, no. 21 (November 18, 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.
Full textMo, Jiaqing, Zhongwang Hu, Hang Chen, and Wei Shen. "An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing." Wireless Communications and Mobile Computing 2019 (February 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/4520685.
Full textGallegati, Silvia, Luca Aquilanti, Valerio Temperini, Gloria Polinesi, and Giorgio Rappelli. "The Impact of Coronavirus Information-Seeking Behavior on Dental Care Access: A Cross-Sectional Questionnaire-Based Study." International Journal of Environmental Research and Public Health 18, no. 22 (November 17, 2021): 12050. http://dx.doi.org/10.3390/ijerph182212050.
Full textMa, Xue Chao, and Yan Bo Liu. "Research and Application of Information Hiding Algorithm." Applied Mechanics and Materials 672-674 (October 2014): 2009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2009.
Full text