Journal articles on the topic 'User anonymity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'User anonymity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Peddinti, Sai Teja, Keith W. Ross, and Justin Cappos. "User Anonymity on Twitter." IEEE Security & Privacy 15, no. 3 (2017): 84–87. http://dx.doi.org/10.1109/msp.2017.74.
Full textLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Full textAn, Young Hwa. "Security Weaknesses and Improvements of a Remote User Authentication Scheme Preserving User Anonymity." Applied Mechanics and Materials 145 (December 2011): 184–88. http://dx.doi.org/10.4028/www.scientific.net/amm.145.184.
Full textChoi, Jong-Seok, and Seung-Soo Shin. "Traceable Authentication Scheme Providing User Anonymity." Journal of the Korea Contents Association 9, no. 4 (April 28, 2009): 95–102. http://dx.doi.org/10.5392/jkca.2009.9.4.095.
Full textKANG, Miyoung, Hyun Sook RHEE, and Jin-Young CHOI. "Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 2 (2011): 860–64. http://dx.doi.org/10.1587/transfun.e94.a.860.
Full textTseng, Huei-Ru, Rong-Hong Jan, and Wuu Yang. "A bilateral remote user authentication scheme that preserves user anonymity." Security and Communication Networks 1, no. 4 (July 2008): 301–8. http://dx.doi.org/10.1002/sec.26.
Full textWu, Shuhua, Yuefei Zhu, and Qiong Pu. "Robust smart-cards-based user authentication scheme with user anonymity." Security and Communication Networks 5, no. 2 (April 28, 2011): 236–48. http://dx.doi.org/10.1002/sec.315.
Full textDas, Debajyoti, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. "Comprehensive Anonymity Trilemma: User Coordination is not enough." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 356–83. http://dx.doi.org/10.2478/popets-2020-0056.
Full textShin, Kwang-Cheul. "A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity." Journal of Society for e-Business Studies 18, no. 2 (May 31, 2013): 81–93. http://dx.doi.org/10.7838/jsebs.2013.18.2.081.
Full textChandrakar, Preeti, and Hari Om. "RSA Based Two-factor Remote User Authentication Scheme with User Anonymity." Procedia Computer Science 70 (2015): 318–24. http://dx.doi.org/10.1016/j.procs.2015.10.023.
Full textKhan, Muhammad Khurram, and Saru Kumari. "An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity." BioMed Research International 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/491289.
Full textPerera, Maharage Nisansala Sevwandi, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, and Kouichi Sakurai. "A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity." Cryptography 6, no. 1 (January 19, 2022): 3. http://dx.doi.org/10.3390/cryptography6010003.
Full textKwang Cheul Shin, and Kyu Jong Oh. "Smartcard-Based Remote Authentication Scheme Preserving User Anonymity." International Journal of Information Processing and Management 4, no. 2 (April 30, 2013): 10–18. http://dx.doi.org/10.4156/ijipm.vol4.issue2.2.
Full textKIM, W., E. RYU, J. IM, and K. YOO. "New conference key agreement protocol with user anonymity." Computer Standards & Interfaces 27, no. 2 (January 2005): 185–90. http://dx.doi.org/10.1016/s0920-5489(04)00065-0.
Full textDjellali, Benchaa, Kheira Belarbi, Abdallah Chouarfia, and Pascal Lorenz. "User authentication scheme preserving anonymity for ubiquitous devices." Security and Communication Networks 8, no. 17 (March 26, 2015): 3131–41. http://dx.doi.org/10.1002/sec.1238.
Full textWinkler, Stephanie, and Sherali Zeadally. "An analysis of tools for online anonymity." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 436–53. http://dx.doi.org/10.1108/ijpcc-08-2015-0030.
Full textFragkouli, Georgia, Katerina Argyraki, and Bryan Ford. "MorphIT: Morphing Packet Reports for Internet Transparency." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 88–104. http://dx.doi.org/10.2478/popets-2019-0021.
Full textPak, Kyong-Sok, Mi-Hyang Kim, Song-Ho Pak, and Chol-Man Ho. "Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps." PLOS ONE 17, no. 9 (September 16, 2022): e0273664. http://dx.doi.org/10.1371/journal.pone.0273664.
Full textBuccafurri, Francesco, Vincenzo De Angelis, and Sara Lazzaro . "A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees." Future Internet 14, no. 8 (August 21, 2022): 243. http://dx.doi.org/10.3390/fi14080243.
Full textLanders, Richard N., and Rachel C. Callan. "An Experiment on Anonymity and Multi-User Virtual Environments." International Journal of Gaming and Computer-Mediated Simulations 6, no. 2 (April 2014): 53–64. http://dx.doi.org/10.4018/ijgcms.2014040105.
Full textChang, Ya-Fen, Wei-Liang Tai, and Min-How Hsu. "A Secure Mobility Network Authentication Scheme Ensuring User Anonymity." Symmetry 9, no. 12 (December 8, 2017): 307. http://dx.doi.org/10.3390/sym9120307.
Full textBlundo, C., Luiz A. Frota Mattos, and D. R. Stinson. "Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels." Journal of Computer Security 3, no. 4 (October 1, 1995): 309–22. http://dx.doi.org/10.3233/jcs-1994/1995-3406.
Full textHuiFeng Huang, KuoChing Liu, and HongWei Chang. "Advanced Smart Card Based Password Authentication with User Anonymity." Journal of Convergence Information Technology 7, no. 14 (August 31, 2012): 419–27. http://dx.doi.org/10.4156/jcit.vol7.issue14.48.
Full textMun, Hyung-Jin. "Real Time User Location Information Protection Model Using Anonymity." Journal of the Korea Institute of Information and Communication Engineering 17, no. 10 (October 31, 2013): 2316–22. http://dx.doi.org/10.6109/jkiice.2013.17.10.2316.
Full textTselikis, Christos, Christos Douligeris, Leandros Maglaras, and Sarandis Mitropoulos. "On the conference key distribution system with user anonymity." Journal of Information Security and Applications 54 (October 2020): 102556. http://dx.doi.org/10.1016/j.jisa.2020.102556.
Full textTripathy, S., and S. Nandi. "Secure user-identification and key distribution scheme preserving anonymity." International Journal of Security and Networks 3, no. 3 (2008): 201. http://dx.doi.org/10.1504/ijsn.2008.020094.
Full textYOON, Eun-Jun, and Kee-Young YOO. "Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Information and Systems E95.D, no. 6 (2012): 1687–89. http://dx.doi.org/10.1587/transinf.e95.d.1687.
Full textYoon, Eun-Jun, and Kee-Young Yoo. "An Improvement of the User Identification and Key Agreement Protocol with User Anonymity." Informatica 23, no. 1 (January 1, 2012): 155–72. http://dx.doi.org/10.15388/informatica.2012.354.
Full textKumari, Saru, and Muhammad Khurram Khan. "More secure smart card-based remote user password authentication scheme with user anonymity." Security and Communication Networks 7, no. 11 (November 14, 2013): 2039–53. http://dx.doi.org/10.1002/sec.916.
Full textLiu, Fuyu, and Kien A. Hua. "Protecting User Privacy Better with Query l-Diversity." International Journal of Information Security and Privacy 4, no. 2 (April 2010): 1–18. http://dx.doi.org/10.4018/jisp.2010040101.
Full textQu, Juan, and Li-min Zou. "An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme." Journal of Electrical and Computer Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/786587.
Full textLi, Mingzhen, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, and Guangcan Yang. "Cross-Platform Strong Privacy Protection Mechanism for Review Publication." Security and Communication Networks 2021 (June 8, 2021): 1–22. http://dx.doi.org/10.1155/2021/5556155.
Full textShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (January 1, 2012): 13. http://dx.doi.org/10.5772/50912.
Full textXu, Cheng Qiang, and Zhen Li Zhang. "Attacks on Young-Hwa An’s Improved Dynamic ID-Based Remote User Authentication Scheme." Applied Mechanics and Materials 556-562 (May 2014): 5235–38. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5235.
Full textChen, Chien-Ming, Shuangshuang Liu, Shehzad Ashraf Chaudhry, Yeh-Cheng Chen, and Muhammad Asghar khan. "A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare." Computer Modeling in Engineering & Sciences 131, no. 1 (2022): 307–29. http://dx.doi.org/10.32604/cmes.2022.018749.
Full textXIONG, Hu, Xiaofeng WANG, and Fagen LI. "Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95-A, no. 1 (2012): 256–58. http://dx.doi.org/10.1587/transfun.e95.a.256.
Full textCho, Jung Gil, and Won Whoi Huh. "An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 127–36. http://dx.doi.org/10.14257/ijsia.2014.8.6.12.
Full textShin, Soobok, Hongjin Yeh, and Kangseok Kim. "An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks." Peer-to-Peer Networking and Applications 8, no. 4 (June 30, 2013): 674–83. http://dx.doi.org/10.1007/s12083-013-0218-2.
Full textKang, Dongwoo, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, and Dongho Won. "Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain." Security and Communication Networks 9, no. 11 (February 4, 2016): 1462–76. http://dx.doi.org/10.1002/sec.1432.
Full textLuarn, Pin, and Ai-Yun Hsieh. "Speech or silence." Online Information Review 38, no. 7 (November 4, 2014): 881–95. http://dx.doi.org/10.1108/oir-03-2014-0076.
Full textDr. N. Dhanalakshmi, Dr. A. Thomas Paul Roy, Dr D. Suresh,. "A NOVEL PRIVACY PRESERVATION MECHANISM FOR DATA AND USER IN DISTRIBUTED SERVERS." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 17, 2021): 1151–56. http://dx.doi.org/10.17762/itii.v9i1.248.
Full textJinwala, Devesh C., and Mukti Padhya. "Revocable key aggregate searchable encryption with user privacy and anonymity." International Journal of Information and Computer Security 19, no. 1/2 (2022): 1. http://dx.doi.org/10.1504/ijics.2022.10051390.
Full textGupta, Sunil, Pradeep Arya, and Hitesh Kumar Sharma. "User Anonymity based Secure Authentication Protocol for Telemedical Server Systems." International Journal of Information and Computer Security 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijics.2022.10040155.
Full textYe, Lin, Xiangzhan Yu, Junda Zhao, Dongyang Zhan, Xiaojiang Du, and Mohsen Guizani. "Deciding Your Own Anonymity: User-Oriented Node Selection in I2P." IEEE Access 6 (2018): 71350–59. http://dx.doi.org/10.1109/access.2018.2881719.
Full textYoon, Eun-Jun, Kee-Young Yoo, and Keum-Sook Ha. "A user friendly authentication scheme with anonymity for wireless communications." Computers & Electrical Engineering 37, no. 3 (May 2011): 356–64. http://dx.doi.org/10.1016/j.compeleceng.2011.03.002.
Full textPark, Mi-Og. "Improved User Anonymity Authentication Scheme using Smart Card for Traceability." Journal of the Korea Society of Computer and Information 17, no. 11 (November 30, 2012): 83–91. http://dx.doi.org/10.9708/jksci/2012.17.11.083.
Full textNikooghadam, Morteza, Reza Jahantigh, and Hamed Arshad. "A lightweight authentication and key agreement protocol preserving user anonymity." Multimedia Tools and Applications 76, no. 11 (July 15, 2016): 13401–23. http://dx.doi.org/10.1007/s11042-016-3704-8.
Full textZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Full textKwon, Yeong-Ae, and Jae-Young Lee. "Biometrics Based User Authentication Scheme for Multi-Server Environments." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1624–29. http://dx.doi.org/10.1166/jctn.2021.9582.
Full textZhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (September 2013): 837–41. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.837.
Full text