USER REVOCATION BASED ANONYMOUS ACCESS PROVISION FOR EFFICIENT CLOUD USER PRIVACY Journal title: GRD Journal for Engineering Authors: M.R.Kavitha Rani, S. Brindha Subject(s):
Patient Clothing – Practical Solution or Means of Imposing Anonymity? Journal title: Journal of Hospital & Medical Management Authors: Bergbom I Subject(s): Management, Health Care Sciences & Services, Business, Finance
ANONIMOWE PŁATNOŚCI INTERNETOWE WYKORZYSTYWANE W CYBERPRZESTĘPCZOŚCI. ISTOTA KRYPTOWALUTY BITCOIN Journal title: De Securitate et Defensione. O Bezpieczeństwie i Obronności Authors: Kamil Mazurczak Subject(s):
Dialogues of the dead: Social identity in eighteenth-century anonymous satire Journal title: Token: A Journal of English Linguistics Authors: Anni Sairio Subject(s): Linguistics, Languages and Literature, English Language
Mitigating Hotspot Locating Attack in Wireless Sensor Network Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
A Framework to maintain Access Control Mechanism for Relation Database Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Secured Routing Using ALERT in MANETs Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Attribute Couplet Attacks and Seclusion Protection in Social Networks Journal title: International Journal of Trend in Scientific Research and Development Authors: Subject(s): Biological Sciences, Computer and Information Science, Engineering, Mathematics, Agricultural Engineering, Management, Engineering, Multidisciplinary
K-Anonymization Techniques for Hiding Multi-Sensitive Information Journal title: Scholars Journal of Engineering and Technology Authors: Anisha Tiwari, Minu Choudhary Subject(s):
A Review on K-Anonymization Techniques Journal title: Scholars Journal of Engineering and Technology Authors: Anisha Tiwari, Minu Choudhary Subject(s):
A Study of Pairing-Free Identity-Based Mutual Authenticated Protocol for Cloud Computing Journal title: International Journal of engineering Research and Applications Authors: Vinod Kumar, Musheer Ahmad, Adesh Kumari, Pankaj Kumar Subject(s):
Recuperating the Packet Drops and Network Traffic problems from Flow Control Headaches Journal title: International Journal of engineering Research and Applications Authors: P Sukanya, Dr. U. D. Prasan Subject(s):