Статті в журналах з теми "Anonymous channel"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Anonymous channel".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.
Повний текст джерелаUtami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.
Повний текст джерелаMiceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.
Повний текст джерелаTriantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.
Повний текст джерелаJuang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.
Повний текст джерелаNurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.
Повний текст джерелаAldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.
Повний текст джерелаHwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.
Повний текст джерелаBanerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.
Повний текст джерелаCiobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.
Повний текст джерелаHURZHI, S. "The current threatening trends in the use of Telegram channels to the damage of state interests." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 162–69. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249297.
Повний текст джерелаPang, Liaojun, Man Kou, Mengmeng Wei, and Huixian Li. "Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel." IEEE Access 7 (2019): 84091–106. http://dx.doi.org/10.1109/access.2019.2924654.
Повний текст джерелаJohansson, Elka, and Peter Carey. "Detecting Fraud: The Role of the Anonymous Reporting Channel." Journal of Business Ethics 139, no. 2 (May 8, 2015): 391–409. http://dx.doi.org/10.1007/s10551-015-2673-6.
Повний текст джерелаAdil, Muhammad, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, and Omar Almomani. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8 (April 18, 2020): 2311. http://dx.doi.org/10.3390/s20082311.
Повний текст джерелаMao, Chang M., and David C. DeAndrea. "How Anonymity and Visibility Affordances Influence Employees’ Decisions About Voicing Workplace Concerns." Management Communication Quarterly 33, no. 2 (November 25, 2018): 160–88. http://dx.doi.org/10.1177/0893318918813202.
Повний текст джерелаBOUDA, JAN, and JOSEF ŠPROJCAR. "QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY." International Journal of Quantum Information 09, no. 02 (March 2011): 651–63. http://dx.doi.org/10.1142/s0219749911007691.
Повний текст джерелаShi, Leyi, Yuxiao Song, Zhiyu Xue, Yihao Liu, and Honglong Chen. "SACT: A New Model of Covert Communication Based on SDN." Sensors 20, no. 24 (December 19, 2020): 7300. http://dx.doi.org/10.3390/s20247300.
Повний текст джерелаBarbancho, A. M., and A. Peinado. "Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications." Computer Networks 43, no. 6 (December 2003): 777–85. http://dx.doi.org/10.1016/s1389-1286(03)00318-9.
Повний текст джерелаYang, Chou-Chen, Yuan-Liang Tang, Ren-Chiun Wang, and Hung-Wen Yang. "A secure and efficient authentication protocol for anonymous channel in wireless communications." Applied Mathematics and Computation 169, no. 2 (October 2005): 1431–39. http://dx.doi.org/10.1016/j.amc.2004.10.073.
Повний текст джерелаLi, Xie, and Ren Yanli. "Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles." International Journal of Digital Crime and Forensics 6, no. 2 (April 2014): 40–51. http://dx.doi.org/10.4018/ijdcf.2014040103.
Повний текст джерелаEmura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation." Journal of Information Security and Applications 34 (June 2017): 84–91. http://dx.doi.org/10.1016/j.jisa.2016.12.001.
Повний текст джерелаŠPROJCAR, JOSEF. "PROPOSAL OF A SEMIFORMAL MODEL OF ANONYMOUS COMMUNICATION." International Journal of Foundations of Computer Science 20, no. 03 (June 2009): 523–48. http://dx.doi.org/10.1142/s0129054109006711.
Повний текст джерелаWalters, W. Patrick, and Jürgen Bajorath. "On the evolving open peer review culture for chemical information science." F1000Research 4 (November 25, 2015): 1350. http://dx.doi.org/10.12688/f1000research.7460.1.
Повний текст джерелаKaigo, Muneo. "Internet Aggregators Constructing the Political Right Wing in Japan." JeDEM - eJournal of eDemocracy and Open Government 5, no. 1 (November 20, 2013): 59–79. http://dx.doi.org/10.29379/jedem.v5i1.184.
Повний текст джерелаBanerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.087392.
Повний текст джерелаBanerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.10007999.
Повний текст джерелаLee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications." Security and Communication Networks 5, no. 12 (February 29, 2012): 1375–78. http://dx.doi.org/10.1002/sec.430.
Повний текст джерелаNoor, Fazal, Turki A. Kordy, Ahmad B. Alkhodre, Oussama Benrhouma, Adnan Nadeem, and Ali Alzahrani. "Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption." Wireless Communications and Mobile Computing 2021 (October 7, 2021): 1–14. http://dx.doi.org/10.1155/2021/5986469.
Повний текст джерелаSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Повний текст джерелаMo, Jiaqing, Wei Shen, and Weisheng Pan. "An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems." Wireless Communications and Mobile Computing 2020 (April 23, 2020): 1–13. http://dx.doi.org/10.1155/2020/5686498.
Повний текст джерелаBumann, Dirk, and Jens Krause. "Front Individuals Lead in Shoals of Three-Spined Sticklebacks (Gasterosteus Aculeatus) and Juvenile Roach (Rutilus Rutilus)." Behaviour 125, no. 3-4 (1993): 189–98. http://dx.doi.org/10.1163/156853993x00236.
Повний текст джерелаHuang, Jin, Bo Xu, and Kun Qiu. "Modeling and Simulation of FC-AE-ASM Network." Advanced Materials Research 748 (August 2013): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amr.748.941.
Повний текст джерелаZhang, Jian, Kurt Pany, and Philip M. J. Reckers. "Under Which Conditions are Whistleblowing “Best Practices” Best?" AUDITING: A Journal of Practice & Theory 32, no. 3 (March 1, 2013): 171–81. http://dx.doi.org/10.2308/ajpt-50451.
Повний текст джерелаZuckerman, Inon, Dor Mizrahi, and Ilan Laufer. "EEG Pattern Classification of Picking and Coordination Using Anonymous Random Walks." Algorithms 15, no. 4 (March 26, 2022): 114. http://dx.doi.org/10.3390/a15040114.
Повний текст джерелаCroes, Emmelyn A. J., Marjolijn L. Antheunis, Alexander P. Schouten, Emiel J. Krahmer, and Daniëlle N. M. Bleize. "The effect of interaction topic and social ties on media choice and the role of four underlying mechanisms." Communications 43, no. 1 (March 26, 2018): 47–73. http://dx.doi.org/10.1515/commun-2017-0046.
Повний текст джерелаChang, Ya-Fen, Wei-Liang Tai, Po-Lin Hou, and Kuan-Yu Lai. "A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments." Symmetry 13, no. 7 (June 23, 2021): 1121. http://dx.doi.org/10.3390/sym13071121.
Повний текст джерелаZhang, Junsong, Qikun Zhang, Zhigang Li, Xianling Lu, and Yong Gan. "A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (July 22, 2021): 1–11. http://dx.doi.org/10.1155/2021/4939589.
Повний текст джерелаUllah, Insaf, Muhammad Asghar Khan, Mohammed H. Alsharif, and Rosdiadee Nordin. "An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles." Sustainability 13, no. 19 (September 30, 2021): 10891. http://dx.doi.org/10.3390/su131910891.
Повний текст джерелаRobertson, Jesse C., Chad M. Stefaniak, and Mary B. Curtis. "Does Wrongdoer Reputation Matter? Impact of Auditor-Wrongdoer Performance and Likeability Reputations on Fellow Auditors' Intention to Take Action and Choice of Reporting Outlet." Behavioral Research in Accounting 23, no. 2 (November 1, 2011): 207–34. http://dx.doi.org/10.2308/bria-50022.
Повний текст джерелаNoether, Shen, Adam Mackenzie, and The Monero Research Lab. "Ring Confidential Transactions." Ledger 1 (December 21, 2016): 1–18. http://dx.doi.org/10.5195/ledger.2016.34.
Повний текст джерелаGuo, Junyan, and Ye Du. "A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network." Security and Communication Networks 2020 (August 25, 2020): 1–12. http://dx.doi.org/10.1155/2020/5167832.
Повний текст джерелаFisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.
Повний текст джерелаFisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.
Повний текст джерелаLee, Misuk. "Will this search end up with booking? Modeling airline booking conversion of anonymous visitors." Journal of Tourism Analysis: Revista de Análisis Turístico 27, no. 2 (July 3, 2020): 237–50. http://dx.doi.org/10.1108/jta-11-2019-0038.
Повний текст джерелаOrús, Carlos, Raquel Gurrea, and Sergio Ibáñez-Sánchez. "The impact of consumers’ positive online recommendations on the omnichannel webrooming experience." Spanish Journal of Marketing - ESIC 23, no. 3 (December 2, 2019): 397–414. http://dx.doi.org/10.1108/sjme-08-2019-0067.
Повний текст джерелаKaplan, Steven E., and Joseph J. Schultz. "Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting." Journal of Business Ethics 71, no. 2 (January 25, 2007): 109–24. http://dx.doi.org/10.1007/s10551-006-0021-6.
Повний текст джерелаSattar, Zina. "A Practical E-Test System." International Journal of Emerging Technologies in Learning (iJET) 14, no. 21 (November 18, 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.
Повний текст джерелаMo, Jiaqing, Zhongwang Hu, Hang Chen, and Wei Shen. "An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing." Wireless Communications and Mobile Computing 2019 (February 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/4520685.
Повний текст джерелаGallegati, Silvia, Luca Aquilanti, Valerio Temperini, Gloria Polinesi, and Giorgio Rappelli. "The Impact of Coronavirus Information-Seeking Behavior on Dental Care Access: A Cross-Sectional Questionnaire-Based Study." International Journal of Environmental Research and Public Health 18, no. 22 (November 17, 2021): 12050. http://dx.doi.org/10.3390/ijerph182212050.
Повний текст джерелаMa, Xue Chao, and Yan Bo Liu. "Research and Application of Information Hiding Algorithm." Applied Mechanics and Materials 672-674 (October 2014): 2009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2009.
Повний текст джерела