Статті в журналах з теми "User anonymity"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "User anonymity".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Peddinti, Sai Teja, Keith W. Ross, and Justin Cappos. "User Anonymity on Twitter." IEEE Security & Privacy 15, no. 3 (2017): 84–87. http://dx.doi.org/10.1109/msp.2017.74.
Повний текст джерелаLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Повний текст джерелаAn, Young Hwa. "Security Weaknesses and Improvements of a Remote User Authentication Scheme Preserving User Anonymity." Applied Mechanics and Materials 145 (December 2011): 184–88. http://dx.doi.org/10.4028/www.scientific.net/amm.145.184.
Повний текст джерелаChoi, Jong-Seok, and Seung-Soo Shin. "Traceable Authentication Scheme Providing User Anonymity." Journal of the Korea Contents Association 9, no. 4 (April 28, 2009): 95–102. http://dx.doi.org/10.5392/jkca.2009.9.4.095.
Повний текст джерелаKANG, Miyoung, Hyun Sook RHEE, and Jin-Young CHOI. "Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 2 (2011): 860–64. http://dx.doi.org/10.1587/transfun.e94.a.860.
Повний текст джерелаTseng, Huei-Ru, Rong-Hong Jan, and Wuu Yang. "A bilateral remote user authentication scheme that preserves user anonymity." Security and Communication Networks 1, no. 4 (July 2008): 301–8. http://dx.doi.org/10.1002/sec.26.
Повний текст джерелаWu, Shuhua, Yuefei Zhu, and Qiong Pu. "Robust smart-cards-based user authentication scheme with user anonymity." Security and Communication Networks 5, no. 2 (April 28, 2011): 236–48. http://dx.doi.org/10.1002/sec.315.
Повний текст джерелаDas, Debajyoti, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. "Comprehensive Anonymity Trilemma: User Coordination is not enough." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 356–83. http://dx.doi.org/10.2478/popets-2020-0056.
Повний текст джерелаShin, Kwang-Cheul. "A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity." Journal of Society for e-Business Studies 18, no. 2 (May 31, 2013): 81–93. http://dx.doi.org/10.7838/jsebs.2013.18.2.081.
Повний текст джерелаChandrakar, Preeti, and Hari Om. "RSA Based Two-factor Remote User Authentication Scheme with User Anonymity." Procedia Computer Science 70 (2015): 318–24. http://dx.doi.org/10.1016/j.procs.2015.10.023.
Повний текст джерелаKhan, Muhammad Khurram, and Saru Kumari. "An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity." BioMed Research International 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/491289.
Повний текст джерелаPerera, Maharage Nisansala Sevwandi, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, and Kouichi Sakurai. "A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity." Cryptography 6, no. 1 (January 19, 2022): 3. http://dx.doi.org/10.3390/cryptography6010003.
Повний текст джерелаKwang Cheul Shin, and Kyu Jong Oh. "Smartcard-Based Remote Authentication Scheme Preserving User Anonymity." International Journal of Information Processing and Management 4, no. 2 (April 30, 2013): 10–18. http://dx.doi.org/10.4156/ijipm.vol4.issue2.2.
Повний текст джерелаKIM, W., E. RYU, J. IM, and K. YOO. "New conference key agreement protocol with user anonymity." Computer Standards & Interfaces 27, no. 2 (January 2005): 185–90. http://dx.doi.org/10.1016/s0920-5489(04)00065-0.
Повний текст джерелаDjellali, Benchaa, Kheira Belarbi, Abdallah Chouarfia, and Pascal Lorenz. "User authentication scheme preserving anonymity for ubiquitous devices." Security and Communication Networks 8, no. 17 (March 26, 2015): 3131–41. http://dx.doi.org/10.1002/sec.1238.
Повний текст джерелаWinkler, Stephanie, and Sherali Zeadally. "An analysis of tools for online anonymity." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 436–53. http://dx.doi.org/10.1108/ijpcc-08-2015-0030.
Повний текст джерелаFragkouli, Georgia, Katerina Argyraki, and Bryan Ford. "MorphIT: Morphing Packet Reports for Internet Transparency." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 88–104. http://dx.doi.org/10.2478/popets-2019-0021.
Повний текст джерелаPak, Kyong-Sok, Mi-Hyang Kim, Song-Ho Pak, and Chol-Man Ho. "Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps." PLOS ONE 17, no. 9 (September 16, 2022): e0273664. http://dx.doi.org/10.1371/journal.pone.0273664.
Повний текст джерелаBuccafurri, Francesco, Vincenzo De Angelis, and Sara Lazzaro . "A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees." Future Internet 14, no. 8 (August 21, 2022): 243. http://dx.doi.org/10.3390/fi14080243.
Повний текст джерелаLanders, Richard N., and Rachel C. Callan. "An Experiment on Anonymity and Multi-User Virtual Environments." International Journal of Gaming and Computer-Mediated Simulations 6, no. 2 (April 2014): 53–64. http://dx.doi.org/10.4018/ijgcms.2014040105.
Повний текст джерелаChang, Ya-Fen, Wei-Liang Tai, and Min-How Hsu. "A Secure Mobility Network Authentication Scheme Ensuring User Anonymity." Symmetry 9, no. 12 (December 8, 2017): 307. http://dx.doi.org/10.3390/sym9120307.
Повний текст джерелаBlundo, C., Luiz A. Frota Mattos, and D. R. Stinson. "Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels." Journal of Computer Security 3, no. 4 (October 1, 1995): 309–22. http://dx.doi.org/10.3233/jcs-1994/1995-3406.
Повний текст джерелаHuiFeng Huang, KuoChing Liu, and HongWei Chang. "Advanced Smart Card Based Password Authentication with User Anonymity." Journal of Convergence Information Technology 7, no. 14 (August 31, 2012): 419–27. http://dx.doi.org/10.4156/jcit.vol7.issue14.48.
Повний текст джерелаMun, Hyung-Jin. "Real Time User Location Information Protection Model Using Anonymity." Journal of the Korea Institute of Information and Communication Engineering 17, no. 10 (October 31, 2013): 2316–22. http://dx.doi.org/10.6109/jkiice.2013.17.10.2316.
Повний текст джерелаTselikis, Christos, Christos Douligeris, Leandros Maglaras, and Sarandis Mitropoulos. "On the conference key distribution system with user anonymity." Journal of Information Security and Applications 54 (October 2020): 102556. http://dx.doi.org/10.1016/j.jisa.2020.102556.
Повний текст джерелаTripathy, S., and S. Nandi. "Secure user-identification and key distribution scheme preserving anonymity." International Journal of Security and Networks 3, no. 3 (2008): 201. http://dx.doi.org/10.1504/ijsn.2008.020094.
Повний текст джерелаYOON, Eun-Jun, and Kee-Young YOO. "Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Information and Systems E95.D, no. 6 (2012): 1687–89. http://dx.doi.org/10.1587/transinf.e95.d.1687.
Повний текст джерелаYoon, Eun-Jun, and Kee-Young Yoo. "An Improvement of the User Identification and Key Agreement Protocol with User Anonymity." Informatica 23, no. 1 (January 1, 2012): 155–72. http://dx.doi.org/10.15388/informatica.2012.354.
Повний текст джерелаKumari, Saru, and Muhammad Khurram Khan. "More secure smart card-based remote user password authentication scheme with user anonymity." Security and Communication Networks 7, no. 11 (November 14, 2013): 2039–53. http://dx.doi.org/10.1002/sec.916.
Повний текст джерелаLiu, Fuyu, and Kien A. Hua. "Protecting User Privacy Better with Query l-Diversity." International Journal of Information Security and Privacy 4, no. 2 (April 2010): 1–18. http://dx.doi.org/10.4018/jisp.2010040101.
Повний текст джерелаQu, Juan, and Li-min Zou. "An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme." Journal of Electrical and Computer Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/786587.
Повний текст джерелаLi, Mingzhen, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, and Guangcan Yang. "Cross-Platform Strong Privacy Protection Mechanism for Review Publication." Security and Communication Networks 2021 (June 8, 2021): 1–22. http://dx.doi.org/10.1155/2021/5556155.
Повний текст джерелаShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (January 1, 2012): 13. http://dx.doi.org/10.5772/50912.
Повний текст джерелаXu, Cheng Qiang, and Zhen Li Zhang. "Attacks on Young-Hwa An’s Improved Dynamic ID-Based Remote User Authentication Scheme." Applied Mechanics and Materials 556-562 (May 2014): 5235–38. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5235.
Повний текст джерелаChen, Chien-Ming, Shuangshuang Liu, Shehzad Ashraf Chaudhry, Yeh-Cheng Chen, and Muhammad Asghar khan. "A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare." Computer Modeling in Engineering & Sciences 131, no. 1 (2022): 307–29. http://dx.doi.org/10.32604/cmes.2022.018749.
Повний текст джерелаXIONG, Hu, Xiaofeng WANG, and Fagen LI. "Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95-A, no. 1 (2012): 256–58. http://dx.doi.org/10.1587/transfun.e95.a.256.
Повний текст джерелаCho, Jung Gil, and Won Whoi Huh. "An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 127–36. http://dx.doi.org/10.14257/ijsia.2014.8.6.12.
Повний текст джерелаShin, Soobok, Hongjin Yeh, and Kangseok Kim. "An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks." Peer-to-Peer Networking and Applications 8, no. 4 (June 30, 2013): 674–83. http://dx.doi.org/10.1007/s12083-013-0218-2.
Повний текст джерелаKang, Dongwoo, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, and Dongho Won. "Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain." Security and Communication Networks 9, no. 11 (February 4, 2016): 1462–76. http://dx.doi.org/10.1002/sec.1432.
Повний текст джерелаLuarn, Pin, and Ai-Yun Hsieh. "Speech or silence." Online Information Review 38, no. 7 (November 4, 2014): 881–95. http://dx.doi.org/10.1108/oir-03-2014-0076.
Повний текст джерелаDr. N. Dhanalakshmi, Dr. A. Thomas Paul Roy, Dr D. Suresh,. "A NOVEL PRIVACY PRESERVATION MECHANISM FOR DATA AND USER IN DISTRIBUTED SERVERS." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 17, 2021): 1151–56. http://dx.doi.org/10.17762/itii.v9i1.248.
Повний текст джерелаJinwala, Devesh C., and Mukti Padhya. "Revocable key aggregate searchable encryption with user privacy and anonymity." International Journal of Information and Computer Security 19, no. 1/2 (2022): 1. http://dx.doi.org/10.1504/ijics.2022.10051390.
Повний текст джерелаGupta, Sunil, Pradeep Arya, and Hitesh Kumar Sharma. "User Anonymity based Secure Authentication Protocol for Telemedical Server Systems." International Journal of Information and Computer Security 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijics.2022.10040155.
Повний текст джерелаYe, Lin, Xiangzhan Yu, Junda Zhao, Dongyang Zhan, Xiaojiang Du, and Mohsen Guizani. "Deciding Your Own Anonymity: User-Oriented Node Selection in I2P." IEEE Access 6 (2018): 71350–59. http://dx.doi.org/10.1109/access.2018.2881719.
Повний текст джерелаYoon, Eun-Jun, Kee-Young Yoo, and Keum-Sook Ha. "A user friendly authentication scheme with anonymity for wireless communications." Computers & Electrical Engineering 37, no. 3 (May 2011): 356–64. http://dx.doi.org/10.1016/j.compeleceng.2011.03.002.
Повний текст джерелаPark, Mi-Og. "Improved User Anonymity Authentication Scheme using Smart Card for Traceability." Journal of the Korea Society of Computer and Information 17, no. 11 (November 30, 2012): 83–91. http://dx.doi.org/10.9708/jksci/2012.17.11.083.
Повний текст джерелаNikooghadam, Morteza, Reza Jahantigh, and Hamed Arshad. "A lightweight authentication and key agreement protocol preserving user anonymity." Multimedia Tools and Applications 76, no. 11 (July 15, 2016): 13401–23. http://dx.doi.org/10.1007/s11042-016-3704-8.
Повний текст джерелаZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Повний текст джерелаKwon, Yeong-Ae, and Jae-Young Lee. "Biometrics Based User Authentication Scheme for Multi-Server Environments." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1624–29. http://dx.doi.org/10.1166/jctn.2021.9582.
Повний текст джерелаZhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (September 2013): 837–41. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.837.
Повний текст джерела