ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
OpenNym : Privacy preserving recommending via pseudonymous group authentication
Security and Privacy
◽
10.1002/spy2.201
◽
2021
◽
Author(s):
Alessandro Checco
◽
Lorenzo Bracciale
◽
Douglas J. Leith
◽
Giuseppe Bianchi
Keyword(s):
Privacy Preserving
◽
Group Authentication
Download Full-text
Related Documents
Cited By
References
A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks
Journal of Communications
◽
10.12720/jcm.12.11.604-610.
◽
2017
◽
Author(s):
Cheng Xu
◽
◽
Xiaohong Huang
◽
Maode Ma
◽
Hong Bao
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
◽
Cross Domain
◽
Group Authentication
Download Full-text
Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns
IEEE Internet of Things Journal
◽
10.1109/jiot.2021.3059047
◽
2021
◽
pp. 1-1
Author(s):
Anjia Yang
◽
Dutliff Boshoff
◽
Qiao Hu
◽
Gerhard Hancke
◽
Xizhao Luo
◽
...
Keyword(s):
Privacy Preserving
◽
Rfid Tags
◽
Group Authentication
Download Full-text
A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks
Journal of Communications
◽
10.12720/jcm.12.11.604-610
◽
2017
◽
pp. 604-610
◽
Cited By ~ 3
Author(s):
Cheng Xu
◽
◽
Xiaohong Huang
◽
Maode Ma
◽
Hong Bao
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
◽
Cross Domain
◽
Group Authentication
Download Full-text
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks
Security and Communication Networks
◽
10.1002/sec.1455
◽
2016
◽
pp. n/a-n/a
◽
Cited By ~ 9
Author(s):
Anmin Fu
◽
Jianye Song
◽
Shuai Li
◽
Gongxuan Zhang
◽
Yuqing Zhang
Keyword(s):
Privacy Preserving
◽
Authentication Protocol
◽
Machine Type
◽
Machine Type Communication
◽
Group Authentication
Download Full-text
A group authentication and privacy-preserving level for vehicular networks based on fuzzy system
Journal of Intelligent & Fuzzy Systems
◽
10.3233/jifs-179928
◽
2020
◽
pp. 1-16
Author(s):
Cheng Xu
◽
Hongzhe Liu
◽
Zhenhua Pan
◽
Wenfa Li
◽
Zhao Ye
Keyword(s):
Fuzzy System
◽
Vehicular Networks
◽
Privacy Preserving
◽
Group Authentication
Download Full-text
A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets
Proceedings of the 2020 2nd International Electronics Communication Conference
◽
10.1145/3409934.3409955
◽
2020
◽
Author(s):
Alican Ozhelvaci
◽
Maode Ma
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
◽
D2d Communications
◽
Group Authentication
Download Full-text
Privacy Preserving Public Auditing in Secured Cloud Storage
International Journal of Scientific Research
◽
10.15373/22778179/march2014/18
◽
2012
◽
Vol 3
(3)
◽
pp. 60-61
Author(s):
V.Sajeev V.Sajeev
◽
◽
R.Gowthamani R.Gowthamani
Keyword(s):
Cloud Storage
◽
Privacy Preserving
◽
Public Auditing
Download Full-text
Adaptive Random Decision Tree: A New Approach for Data Mining with Privacy Preserving
International Journal of Innovative Research in Computer and Communication Engineering
◽
10.15680/ijircce.2015.0307004
◽
2015
◽
Vol 03
(07)
◽
pp. 6378-6384
Author(s):
Hemlata B. Deorukhakar, Prof. Pradnya Kasture
Keyword(s):
Data Mining
◽
Decision Tree
◽
Privacy Preserving
◽
New Approach
Download Full-text
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e101.a.138
◽
2018
◽
Vol E101.A
(1)
◽
pp. 138-148
◽
Cited By ~ 1
Author(s):
Haruna HIGO
◽
Toshiyuki ISSHIKI
◽
Kengo MORI
◽
Satoshi OBANA
Keyword(s):
Privacy Preserving
◽
Hill Climbing
Download Full-text
A Survey of Auditing Techniques for Privacy Preserving and Ensure Data Correctness in the Cloud
International Journal of Advanced Research in Computer Science and Software Engineering
◽
10.23956/ijarcsse/v7i1/0160
◽
2017
◽
Vol 7
(1)
◽
pp. 181-185
◽
Cited By ~ 1
Author(s):
S Durga Bhavani
◽
◽
Gudlanarva Sudhakar
◽
Mohammad Almechal
◽
◽
...
Keyword(s):
Privacy Preserving
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close