|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Lo-Yao Yeh, Jun-Qian Jian, Jen-Wei Hu |
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2023, Tampa, FL, USA, November 7-9, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-8211-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shaohu Zhang, Zhouyu Li, Anupam Das 0001 |
VoicePM: A Robust Privacy Measurement on Voice Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023, pp. 215-226, 2023, ACM, 978-1-4503-9859-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Hugo Senet |
Protocoles cryptographiques post-quantiques de préservation de l'anonymat et du secret des communications. (Anonymity and Secrecy Preserving Post-Quantum Cryptographic Protocols). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
12 | Zhenjie Huang, Zhiwei Lin |
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 65, pp. 103066, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoliang Wang 0002, Liang Bai, Brandon Mausler, Pitam Singh |
A novel conditional anonymity scheme for vehicular communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 35(12), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Thokozani Felix Vallent, Damien Hanyurwimfura, Hyunsung Kim 0001, Chomora Mikeka |
Certificate-less authenticated key agreement scheme with anonymity for smart grid communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 43(2), pp. 1859-1869, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Muhammad Asad 0002, Muhammad Aslam 0004, Syeda Fizzah Jilani, Saima Shaukat, Manabu Tsukada |
SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(11), pp. 338, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li 0043, Yixian Yang, Xiaobin Qian, Xiaomei Yu |
A trusted de-swinging k-anonymity scheme for location privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 11, pp. 2, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai |
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(1), pp. 3, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Chia-Hui Wang, Chih-Hao Hsu |
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(4), pp. 49, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhenpeng Liu, Qiannan Liu, Dewei Miao, Lele Ren, Yonggang Zhao |
A blockchain anonymity solution to prevent location homogeneity attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(27), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Vartika Puri, Parmeet Kaur 0001, Shelly Sachdeva |
(k, m, t)-anonymity: Enhanced privacy for transactional data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(18), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Payal Chaudhari, Manik Lal Das |
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 15(2), pp. 1036-1044, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Kentaro Kita, Yuki Koizumi, Toru Hasegawa |
Private retrieval of location-related content using k-anonymity and application to ICN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 209, pp. 108908, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Arthur Sandor Voundi Koe, Shan Ai, Pengfei Huang, Anli Yan, Juan Tang, Qi Chen, Kanghua Mo, Wanqing Jie, Shiwen Zhang |
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 606, pp. 60-71, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Amogh Pradeep, Hira Javaid, Ryan Williams, Antoine Rault, David R. Choffnes, Stevens Le Blond, Bryan Ford |
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(3), pp. 247-267, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Debajyoti Das 0001, Easwar Vivek Mangipudi, Aniket Kate |
OrgAn: Organizational Anonymity with Low Latency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(3), pp. 582-605, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Javeriah Saleem, Rafiqul Islam 0002, Muhammad Ashad Kabir |
The Anonymity of the Dark Web: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 33628-33660, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga |
RFID Batch Authentication - A Usable Scheme Providing Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 85368-85383, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | J. Jayapradha, M. Prakash 0003, Youseef Alotaibi, Osamah Ibrahim Khalaf, Saleh Ahmed Alghamdi |
Heap Bucketization Anonymity - An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 28773-28791, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mehedi Masud, Gurjot Singh Gaba, Karanjeet Choudhary, M. Shamim Hossain, Mohammed F. Alhamid, Ghulam Muhammad |
Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(4), pp. 2649-2656, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Garfield Benjamin |
Drone culture: perspectives on autonomy and anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 37(2), pp. 635-645, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Amar Rasheed, Rabi N. Mahapatra, Cihan Varol, Narasimha Karpoor |
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. ![In: IEEE Trans. Emerg. Top. Comput. 10(3), pp. 1476-1491, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shiyuan Zheng, Hong Xie 0004, John C. S. Lui |
Optimizing Social Visibility in OSNs With Anonymity Guarantees: Efficient Algorithms and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 9(4), pp. 2237-2251, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Liang Wu, Wenzheng Zhang, Wei Zhao |
Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 14(5), pp. 847, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Qingfeng Tan, Xuebin Wang, Wei Shi 0001, Jian Tang 0008, Zhihong Tian |
An Anonymity Vulnerability in Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 30(6), pp. 2574-2587, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Anil Kumar Sutrala, Mohammad S. Obaidat, Sourav Saha 0002, Ashok Kumar Das, Mamoun Alazab, Youngho Park 0005 |
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(3), pp. 2316-2330, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Wenbo Zhang, Lin Chen, Hengtao Su, Yin Wang, Jingyu Feng |
TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 16(10), pp. 3438-3457, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jie Zhao 0015, Hejiao Huang, Chonglin Gu, Zhongyun Hua, Xiaojun Zhang |
Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme With Reward Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(3), pp. 4477-4488, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Hema Naga Sai Sudha Jagarlapudi, Sunho Lim, Jinseok Chae, Gyu Sang Choi, Cong Pu |
Drone Helps Privacy: Sky Caching Assisted $k$-Anonymity in Spatial Querying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(4), pp. 6360-6370, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Tian Wang, Linli Xu, Mingyue Zhang, Huanhuan Zhang, Gongxuan Zhang |
A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 31(5), pp. 2250083:1-2250083:19, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yang Jiang, Yi-Chun (Chad) Ho, Xiangbin Yan, Yong Tan |
What's in a "Username"? The Effect of Perceived Anonymity on Herding in Crowdfunding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Res. ![In: Inf. Syst. Res. 33(1), pp. 1-17, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lynda Kacha, Abdelhafid Zitouni, Mahieddine Djoudi |
KAB: A new k-anonymity approach based on black hole algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(7), pp. 4075-4088, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhongxiang Wei, Christos Masouros, Ping Wang 0004, Xu Zhu 0001, Jingjing Wang 0001, Athina P. Petropulu |
Physical Layer Anonymous Precoding Design: From the Perspective of Anonymity Entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 40(11), pp. 3224-3238, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Adu-Gyamfi, Albert Kofi Kwansah Ansah, Gabriel Kofi Armah, Seth Alornyo, Dominic Kwasi Adom, Fengli Zhang |
Towards bitcoin transaction anonymity with recurrent attack prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Assur. Eng. Manag. ![In: Int. J. Syst. Assur. Eng. Manag. 13(4), pp. 1-17, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jing Wang, Jianhou Gan, Jun Wang 0101, Juxiang Zhou, Zeguang Lu |
Face Anonymity Based on Facial Pose Consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 14(2), pp. 1-12, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | B. Sowmiya, E. Poovammal |
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 127(2), pp. 1359-1376, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Daniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan van den Heuvel |
Real-world K-Anonymity Applications: the \textsc{KGen} approach and its evaluation in Fraudulent Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.01533, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mingxing Hu, Weijiong Zhang, Zhen Liu |
An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.12093, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Judith Sáinz-Pardo Díaz, Álvaro López García |
pyCANON: A Python library to check the level of anonymity of a dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.07556, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jouko Väänänen |
An atom's worth of anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.07834, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Weilong Ren 0002, Kambiz Ghazinour, Xiang Lian |
kt-Safety: Graph Release via k-Anonymity and t-Closeness (Technical Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.17479, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Christiane Kuhn, Aniket Kate, Thorsten Strufe |
The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.09282, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Gecia Bravo Hermsdorff, Róbert Busa-Fekete, Lee M. Gunderson, Andrés Muñoz Medina, Umar Syed |
Statistical anonymity: Quantifying reidentification risks without reidentifying users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.12306, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh |
Strong Anonymity for Mesh Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.04145, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Domokos Miklós Kelen, István András Seres |
Towards Measuring The Fungibility and Anonymity of Cryptocurrencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.04259, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Hossein Esfandiari, Alessandro Epasto, Vahab S. Mirrokni, Andres Muñoz Medina, Sergei Vassilvitskii |
Smooth Anonymity for Sparse Binary Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.06358, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Haili Sun, Yan Huang 0026, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou |
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.12482, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alexander Goldberg, Giulia Fanti, Nihar B. Shah |
Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.12686, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Michel Raynal, Gadi Taubenfeld |
Symmetry and Anonymity in Shared Memory Concurrent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bull. EATCS ![In: Bull. EATCS 136, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Varun Prajapati, Brij B. Gupta |
A Robust Authentication System With Application Anonymity in Multiple Identity Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. Res. ![In: J. Inf. Technol. Res. 15(1), pp. 1-21, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Francesco Zola, Lander Segurola-Gil, Jan L. Bruse, Mikel Galar, Raul Orduna Urrutia |
Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 52(15), pp. 17289-17314, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yue (Nancy) Dai, Jingyuan Shi |
Vicarious Interactions in Online Support Communities: The Roles of Visual Anonymity and Social Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Mediat. Commun. ![In: J. Comput. Mediat. Commun. 27(3), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Hewen Wang, Jingsha He, Nafei Zhu |
Improving Data Utilization of K-anonymity through Clustering Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Priv. ![In: Trans. Data Priv. 15(3), pp. 177-192, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Donghang Lu, Aniket Kate |
RPM: Robust Anonymity at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1037, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Varun Maram, Keita Xagawa |
Post-Quantum Anonymity of Kyber. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1696, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Roy Rinberg, Nilaksh Agarwal |
Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 985, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Gennaro Avitabile, Vincenzo Botta, Dario Fiore 0001 |
Extendable Threshold Ring Signatures with Enhanced Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1568, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin |
Poly Onions: Achieving Anonymity in the Presence of Churn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 392, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Debajyoti Das 0001, Easwar Vivek Mangipudi, Aniket Kate |
OrgAn: Organizational Anonymity with Low Latency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 488, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos |
Designated-Verifier Linkable Ring Signatures with unconditional anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1138, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung |
Offline User Authentication Ensuring Non-Repudiation and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(24), pp. 9673, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Peter J. R. Macaulay, Lucy R. Betts, James Stiller, Blerina Kellezi |
Bystander responses to cyberbullying: The role of perceived severity, publicity, anonymity, type of cyberbullying, and victim response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 131, pp. 107238, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso |
Anonymity and rewards in peer rating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 30(1), pp. 109-165, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jiabei He, Xuchong Liu, Fan Wu 0003, Chaoyang Chen 0001, Xiong Li 0002 |
A mutual authentication scheme in VANET providing vehicular anonymity and tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 81(2), pp. 175-190, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mukti Padhya, Devesh C. Jinwala |
Revocable key aggregate searchable encryption with user privacy and anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 19(1/2), pp. 1-33, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lewis Nitschinsk, Stephanie J. Tobin, Eric J. Vanman |
The Disinhibiting Effects of Anonymity Increase Online Trolling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 25(6), pp. 377-383, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui |
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(4), pp. 2286-2303, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang 0002, Hui Li 0006, Ben Niu 0001 |
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(1), pp. 370-387, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Fan Wu 0003, Xiong Li 0002, Xiangyang Luo, Ke Gu 0002 |
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 132, pp. 102737, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Deepika Badampudi, Farnaz Fotrousi, Bruno Cartaxo, Muhammad Usman 0002 |
Reporting Consent, Anonymity and Confidentiality Procedures Adopted in Empirical Studies Using Human Participants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e Informatica Softw. Eng. J. ![In: e Informatica Softw. Eng. J. 16(1), pp. 220109, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa |
Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 8th IEEE International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022, pp. 292-296, 2022, IEEE, 978-1-6654-0694-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yijun Duan, Xin Liu 0020, Adam Jatowt, Haitao Yu 0003, Steven J. Lynden, Kyoung-Sook Kim, Akiyoshi Matono |
Anonymity can Help Minority: A Novel Synthetic Data Over-Sampling Strategy on Multi-label Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (2) ![In: Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2022, Grenoble, France, September 19-23, 2022, Proceedings, Part II, pp. 20-36, 2022, Springer, 978-3-031-26389-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos |
Designated-Verifier Linkable Ring Signatures with Unconditional Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAI ![In: Algebraic Informatics - 9th International Conference, CAI 2022, Virtual Event, October 27-29, 2022, Proceedings, pp. 55-68, 2022, Springer, 978-3-031-19684-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Akash Gupta, Gaurav S. Kasbekar |
Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 14th International Conference on COMmunication Systems & NETworkS, COMSNETS 2022, Bangalore, India, January 4-8, 2022, pp. 375-383, 2022, IEEE, 978-1-6654-2104-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin |
Poly Onions: Achieving Anonymity in the Presence of Churn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (2) ![In: Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II, pp. 715-746, 2022, Springer, 978-3-031-22364-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sergio Chica-Manjarrez, Andrés Marín, David Arroyo, Jesus Diaz, Florina Almenáres, Daniel Díaz Sánchez |
Enhancing the Anonymity and Auditability of Whistleblowers Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLOCKCHAIN ![In: Blockchain and Applications, 4th International Congress, BLOCKCHAIN 2022, L'Aquila, Italy, 13-15 July 2022., pp. 413-422, 2022, Springer, 978-3-031-21228-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sami Saad Alsemairi |
AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNAC ![In: 32nd International Telecommunication Networks and Applications Conference, ITNAC 2022, Wellington, New Zealand, November 30 - Dec. 2, 2022, pp. 367-372, 2022, IEEE, 978-1-6654-7103-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yunke Liu, Jianbing Ni, Mohammad Zulkernine |
AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2022, Seoul, Korea, May 16-20, 2022, pp. 4402-4407, 2022, IEEE, 978-1-5386-8347-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura |
Breaking Anonymity of Social Media by Profiling from Multimodal Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS Companion ![In: 22nd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2022 - Companion, Guangzhou, China, December 5-9, 2022, pp. 137-144, 2022, IEEE, 979-8-3503-1991-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Manxiang Yang, Yongtang Wu, Yuling Chen |
A K-anonymity Optimization Algorithm Under Attack Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iThings/GreenCom/CPSCom/SmartData/Cybermatics ![In: 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland, August 22-25, 2022, pp. 357-362, 2022, IEEE, 978-1-6654-5417-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhongxiang Wei, Christos Masouros, Sumei Sun |
Physical Layer Anonymous Communications: An Anonymity Entropy Oriented Precoding Design (Invited Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Virtual and Singapore, 23-27 May 2022, pp. 9022-9026, 2022, IEEE, 978-1-6654-0541-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jing Yu 0007, Shuguang Yuan 0003, Yulin Yuan, Yafan Li, Chi Chen |
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SciSec ![In: Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers, pp. 557-573, 2022, Springer, 978-3-031-17550-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zikai Wang, Xinyi Luo, Meiqi Li, Wentuo Sun, Kaiping Xue |
WeVoting: Blockchain-based Weighted E-Voting with Voter Anonymity and Usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 2585-2590, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Vincent Amande, Kuljeet Kaur, Sahil Garg, Mohsen Guizani |
LASUA: A Lightweight Authentication Scheme with User Anonymity for IoT-Enabled Mobile Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 3563-3568, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ruijie Zhao 0001, Xianwen Deng, Yanhao Wang, Libo Chen, Ming Liu, Zhi Xue, Yijun Wang |
Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 30th IEEE/ACM International Symposium on Quality of Service, IWQoS 2022, Oslo, Norway, June 10-12, 2022, pp. 1-10, 2022, IEEE, 978-1-6654-6824-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Feng Jiang, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang |
A Node-labeling-based Method for Evaluating the Anonymity of Tor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 46th IEEE Annual Computers, Software, and Applications Conferenc, COMPSAC 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022, pp. 773-778, 2022, IEEE, 978-1-6654-8810-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | David A. Joyner, Lily Bernstein, Ian Bolger, Maria-Isabelle Dittamo, Stephanie Gorham, Rachel Hudson |
Anonymity: A Double-Edged Sword for Gender Equity in a CS1 Forum? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE (1) ![In: SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, Providence, RI, USA, March 3-5, 2022, Volume 1, pp. 766-772, 2022, ACM, 978-1-4503-9070-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nan Xiang, Xuebin Ma |
TKDA: An Improved Method for K-degree Anonymity in Social Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2022, Rhodes, Greece, June 30 - July 3, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-9792-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yi Qin, Jiahe Wu, Futai Zou, Yue Wu 0010 |
Breaking Tor's Anonymity by Modifying Cell's Command. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2022, Rhodes, Greece, June 30 - July 3, 2022, pp. 1-7, 2022, IEEE, 978-1-6654-9792-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi |
Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pp. 186-193, 2022, IEEE, 978-1-6654-9560-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed Alsaid, Tylor Slay, Nirupama Bulusu, Robert B. Bass |
K-anonymity applied to the energy grid of things distributed energy resource management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022 - 1 July 2022, pp. 581-582, 2022, ACM, 978-1-4503-9185-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Keita Xagawa |
Anonymity of NIST PQC Round 3 KEMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (3) ![In: Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III, pp. 551-581, 2022, Springer, 978-3-031-07081-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ana Oprescu, Sander Misdorp, Koen van Elsen |
Energy cost and accuracy impact of k-anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT4S ![In: International Conference on ICT for Sustainability, ICT4S 2022, Plovdiv, Bulgaria, June 13-17, 2022, pp. 65-76, 2022, IEEE, 978-1-6654-8286-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jingyi Cao, Bo Liu 0001, Yunqian Wen, Yunhui Zhu, Rong Xie, Li Song 0001, Lin Li 0062, Yaoyao Yin |
Hiding Among Your Neighbors: Face Image Privacy Protection with Differential Private k-anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMSB ![In: IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2022, Bilbao, Spain, June 15-17, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-6901-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yuxin Liu, Kazuhiro Minami |
Flexible Partitioning of Geographical Information based on GPS Coordinates for k-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 2034-2043, 2022, IEEE, 978-1-6654-8045-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Haili Sun, Yan Huang 0026, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou |
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 435-440, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Matteo Campanelli, Mathias Hall-Andersen |
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 652-666, 2022, ACM, 978-1-4503-9140-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sarah Stummer |
Issues of Verifying Anonymity: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26. - 30. September 2022, Hamburg, pp. 179-194, 2022, Gesellschaft für Informatik, Bonn, 978-3-88579-720-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shenwen Lin, Hongliang Mao, Zhen Wu, Jinglin Yang |
Research on Bitcoin Anti-anonymity Technology Based on Behavior Vectors Mapping and Aligning Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNCERT ![In: Cyber Security - 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers, pp. 139-147, 2022, Springer, 978-981-19-8284-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
|
|