The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase k-anonymity (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1994 (20) 1995-1996 (18) 1997-1998 (39) 1999 (39) 2000 (48) 2001 (51) 2002 (58) 2003 (92) 2004 (142) 2005 (192) 2006 (242) 2007 (254) 2008 (312) 2009 (275) 2010 (134) 2011 (132) 2012 (120) 2013 (136) 2014 (121) 2015 (144) 2016 (199) 2017 (278) 2018 (163) 2019 (180) 2020 (176) 2021 (103) 2022 (103) 2023 (109) 2024 (22)
Publication types (Num. hits)
article(1163) book(1) incollection(47) inproceedings(2632) phdthesis(46) proceedings(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2203 occurrences of 764 keywords

Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan 0001 Mondrian Multidimensional K-Anonymity. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi Towards low-perturbation anonymity preserving pattern discovery. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Aharon S. Brodie, Cheng-Zhong Xu 0001, Weisong Shi Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Min Wu, Xiaojun Ye Towards the Diversity of Sensitive Attributes in k-Anonymity. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill Selectively Traceable Anonymity. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Miyako Ohkubo, Masayuki Abe On the Definition of Anonymity for Ring Signatures. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Miyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi LooM: An Anonymity Quantification Method in Pervasive Computing Environments. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Xin-guang Zou, Sheng-He Sun Analysis of Anonymity on the Signatures of Knowledge. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi Blocking Anonymity Threats Raised by Frequent Itemset Mining. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Aggelos Kiayias, Moti Yung Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Daniel R. Figueiredo 0001, Jonathan K. Shapiro, Donald F. Towsley Incentives to Promote Availability in Peer-to-Peer Anonymity Systems. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo MuON: Epidemic Based Mutual Anonymity. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Hung-Yu Chien, Che-Hao Chen A Remote Authentication Scheme Preserving User Anonymity. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung Anonymity and Security in Public Internet Forums. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Chris J. Mitchell Limits to Anonymity When Using Credentials (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya A First Approach to Provide Anonymity in Attribute Certificates. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz Anonymity and Covert Channels in Simple Timed Mix-Firewalls. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Alf Zugenmaier FLASCHE - A Mechanism Providing Anonymity for Mobile Users. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Changjie Wang, Ho-fung Leung Anonymity and Security in Continuous Double Auctions for Internet Retails Market. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Yingwu Zhu, Yiming Hu TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems. Search on Bibsonomy ICPP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Claudia Díaz, Bart Preneel Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji Evaluation of Anonymity of Practical Anonymous Communication Networks. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Andrei Serjantov, Peter Sewell Passive Attack Analysis for Connection-Based Anonymity Systems. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Hua Wang 0002, Jinli Cao, Yahiko Kambayashi Building consumer self-anonymity scalable payment protocol for Internet purchase. Search on Bibsonomy RIDE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Tomas Sander, Amnon Ta-Shma Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Elke Franz 0001, Anja Jerichow A Mix-Mediated Anonymity Service and Its Payment. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
33Steve A. Schneider, Abraham Sidiropoulos CSP and Anonymity. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
32Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, Nikos Mamoulis A framework for efficient data anonymization under privacy and accuracy constraints. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, anonymity
32Prateek Mittal, Nikita Borisov ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer, anonymity, random walks
32Gavin O'Gorman, Stephen Blott Simulating low-latency anonymous networks. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SSFNet, anonymity, Tor
32Mafruz Zaman Ashrafi, See-Kiong Ng Collusion-resistant anonymous data collection method. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, privacy, anonymity
32Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidis, Thomas Deselaers Facilitating the Adoption of Tor by Focusing on a Promising Target Group. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity services, privacy, business models, Adoption
32Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 Publicly Verifiable Privacy-Preserving Group Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography
32Bhuvan Bamba, Ling Liu 0001, Péter Pesti, Ting Wang 0006 Supporting anonymous location queries in mobile environments with privacygrid. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF location privacy, k-anonymity, l-diversity
32Jian-min Han, Ting-ting Cen, Huiqun Yu An Improved V-MDAV Algorithm for l-Diversity. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homogeneity Attack, Background Knowledge Attack, K-Anonymity, L-Diversity
32Jiexing Li, Yufei Tao 0001, Xiaokui Xiao Preservation of proximity privacy in publishing numerical sensitive data. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (?, m)-anonymity, privacy, anonymization, numeric
32Gabriele Gianini, Ernesto Damiani Cloaking games in location based services. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF game theory, location based services, k-anonymity
32Pan Wang, Peng Ning, Douglas S. Reeves A k-anonymous communication protocol for overlay networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, anonymity, overlay networks
32Steven J. Murdoch Hot or not: revealing hidden services by their clock skew. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymity, fingerprinting, temperature, covert channels, clock skew, mix networks, Tor
32Josep Domingo-Ferrer Microaggregation for Database and Location Privacy. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Statistical database privacy, Location privacy, k-Anonymity, Wireless systems, Microaggregation
32Daniel Kifer, Johannes Gehrke Injecting utility into anonymized datasets. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF loglinear models, graphical models, k-anonymity, marginals, l-diversity
32Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Routing, Ad-hoc network, Anonymity, Pairing-Based Cryptography
32He Ge, Stephen R. Tate Traceable Signature: Better Efficiency and Beyond. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature
32Xiaoxin Wu 0001, Bharat K. Bhargava AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF communication privacy, channel access mechanism, anonymity, Ad hoc routing protocol
32Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
32Ronggong Song, Larry Korba, George Yee AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, mobile ad hoc network, anonymity, dynamic source routing
32Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields The predecessor attack: An analysis of a threat to anonymous communications systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF predecessor attack, Privacy, anonymity, anonymous communication
32Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller Covert channels and anonymizing networks. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, information theory, covert channel, MIX
32George Danezis Mix-Networks with Restricted Routes. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mix cascades, anonymity, traffic analysis, Mix networks
32Birgit Pfitzmann, Ahmad-Reza Sadeghi Self-Escrowed Cash against User Blackmailing. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Escrowed Cash, Fair Cash, Digital Coin, Blackmailing, Self-Escrow, Anonymity Revocation
30Vivian Hsueh-hua Chen, Henry Been-Lirn Duh, Chiew Woon Ng Players who play to make others cry: the influence of anonymity and immersion. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF deindividuation, grief play, games, anonymity, immersion
30Renyi Xiao Survey on Anonymity in Unstructured Peer-to-Peer Systems. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unstructured peer-to-peer systems, mutual anonymity, privacy, distributed system
30Yingqin Zhong, Na Liu 0005, John Lim Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration. Search on Bibsonomy Open IT-Based Innovation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cultural orientation, degree of collectivism, anonymity, Attitude, e-collaboration
30Richard Matthew McCutchen, Samir Khuller Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF clustering, anonymity, streaming, outliers, k-center
30Jun-Lin Lin, Meng-Cheng Wei An efficient clustering method for k-anonymization. Search on Bibsonomy PAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF clustering, anonymity, greedy algorithm
30Hyoungmin Park, Kyuseok Shim Approximate algorithms for K-anonymity. Search on Bibsonomy SIGMOD Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF local recoding, data mining, anonymity, privacy preservation, data publishing
30Wei Jiang, Chris Clifton A secure distributed framework for achieving k-anonymity. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Privacy, k-Anonymity
30Monte Lunacek, L. Darrell Whitley, Indrakshi Ray A crossover operator for the k- anonymity problem. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF problem representation, genetic algorithms, K-anonymity
30Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum Provable anonymity. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing
30Marek Klonowski, Miroslaw Kutylowski Provable Anonymity for Networks of Mixes. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anonymity, Markov chain, coupling, mix network, rapid mixing
30Frances M. T. Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens, Niek J. E. Wijngaards Anonymity and software agents: An interdisciplinary challenge. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudoanonymity, agent identity, security, privacy, anonymity, software agents, legal aspects
30Anna Shubina, Sean W. Smith Using caching for browsing anonymity. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF caching proxies, security, privacy, anonymity, human factors, legal aspects
30Matthias Bauer New covert channels in HTTP: adding unwitting Web browsers to anonymity sets. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, HTTP, covert channel, mix network
30Emiran Curtmola, Alin Deutsch, K. K. Ramakrishnan, Divesh Srivastava Load-balanced query dissemination in privacy-aware online communities. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy aware, publisher k-anonymity, query dissemination, user censorship resistant, load balancing, online communities, privacy preservation, k-anonymity, distributed infrastructure
30Arjan Durresi Anonymous communications in the Internet. Search on Bibsonomy Clust. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tradeoff between anonymity and communication overhead, Communication anonymity
28Hiroaki Morio, Christopher Buchholz How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. Search on Bibsonomy AI Soc. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF payment gateway, Anonymous, encryption, mix, purchasing, e-cash, information product
28Parvathinathan Venkitasubramaniam, Ting He 0001, Lang Tong Anonymous Networking Amidst Eavesdroppers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yalong Dong, Zude Li, Xiaojun Ye Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Jens O. Oberender, Hermann de Meer On the Design Dilemma in Dining Cryptographer Networks. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Li Lu 0001, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu 0001, Lionel M. Ni Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Wei Jiang, Maurizio Atzori Secure Distributed k-Anonymous Pattern Mining. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Byungryong Kim Using Group Overlapping to Protect Server from Attack in Grid Computing. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Byungryong Kim Protecting Agent from Attack in Grid Computing. Search on Bibsonomy CDVE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Solving Bao's Colluding Attack in Wang's Fair Payment Protocol. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Li Xiao 0001, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu 0001 A design of overlay anonymous multicast protocol. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Stefan Köpsell Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Zude Li, Guoqiang Zhan, Xiaojun Ye Towards a More Reasonable Generalization Cost Metric for K-Anonymization. Search on Bibsonomy BNCOD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Kai Wei, Alan J. Smith, Yih-Farn Robin Chen, Binh Vo WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jinsong Han, Yunhao Liu 0001 Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Hua Wang 0002, Jinli Cao, Yanchun Zhang A Flexible Payment Scheme and Its Role-Based Access Control. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng Performance Analysis ofWonGoo System. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Gagan Aggarwal, Tomás Feder, Krishnaram Kenthapadi, Rajeev Motwani 0001, Rina Panigrahy, Dilys Thomas, An Zhu Anonymizing Tables. Search on Bibsonomy ICDT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli A Hierarchical Anonymous Communication Protocol for Sensor Networks. Search on Bibsonomy EUC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Krista Bennett, Christian Grothoff gap - Practical Anonymous Networking. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Sandra Steinbrecher, Stefan Köpsell Modelling Unlinkability. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Aameek Singh, Ling Liu 0001 TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 An Optimal Strategy for Anonymous Communication Protocols. Search on Bibsonomy ICDCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari Dealing with anonymity in wireless sensor networks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Edith C. H. Ngai On providing sink anonymity for sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor networks, privacy, wireless communications, data collection
26Michael Backes 0001, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum Anonymity and Censorship Resistance in Unstructured Overlay Networks. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26David Evans 0002, Robert H. Warren Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Wazen M. Shbair, Ahmed R. Bashandy, Samir I. Shaheen A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis. Search on Bibsonomy CSE (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26B. R. Purushothama, Alwyn R. Pais Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System. Search on Bibsonomy IEEE SCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Aris Gkoulalas-Divanis, Vassilios S. Verykios A Free Terrain Model for Trajectory K-Anonymity. Search on Bibsonomy DEXA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ge Zhong, Urs Hengartner Toward a distributed k-anonymity protocol for location privacy. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF location-based services, homomorphic encryption
26Zhihui Wang 0009, Wei Wang 0009, Baile Shi A New Approach for Detecting Anonymity of Patterns. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 3902 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license