Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Anonimato")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1560

  • Page / 63
Export

Selection :

  • and

Nous sommes attachés à l'anonymat car il libère la parole [Interview]DANGAIX, Denis; CHAUMEIL-GUEGUEN, Isabelle.La Santé de l'homme. 2012, Num 422, issn 0151-1998, 32Article

La téléphonie réduit les distances, l'anonymat permet la liberté d'échange [Interview]DANGAIX, Denis; BACQUERIE, Mirentxu.La Santé de l'homme. 2012, Num 422, pp 31-32, issn 0151-1998, 2 p.Article

GAP: Practical anonymous networkingBENNETT, Krista; GROTHOFF, Christian.Lecture notes in computer science. 2003, pp 141-160, issn 0302-9743, isbn 3-540-20610-8, 20 p.Conference Paper

Bioéthique. Le don de gamète en question. OpinionsRIGAUD, N.SCIENCE ET SANTE. 2011, Num 2, pp 42-43, issn 2119-9051, 2 p.Article

les questions d'anonymisation sur internetFROCHOT, Didier.Archimag (Vincennes). 2012, Num 254, pp 35-36, issn 0769-0975, 2 p.Article

Comment saisir la justice ?HAFIZ, Chems-Eddine.DROIT DEONTOLOGIE SOIN. 2013, Vol 13, Num 4, pp 501-508, issn 1629-6583, 8 p.Article

An Experimental Study and Analysis of Crowds based AnonymityKUMAR BHOOBALAN, Lokesh; HARSH, Piyush.Internet computing. International conferenceWorldComp'2011. 2011, pp 30-34, isbn 1-60132-186-4, 5 p.Conference Paper

Convertible ring signatureLEE, K.-C; WEN, H.-A; HWANG, T et al.IEE proceedings. Communications. 2005, Vol 152, Num 4, pp 411-414, issn 1350-2425, 4 p.Article

An efficient anonymous scheme for secure micropaymentsPAYERAS-CAPELLA, Magdalena; FERRER-GOMILA, Josep Lluis; HUGUET-ROTGER, Ll et al.Lecture notes in computer science. 2003, pp 80-83, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

Philosophical dimensions of anonymity in group support systems: Ethical implications of social psychological consequencesKLEIN, Esther E; CLARK, Chalmers C; HERSKOVITZ, Paul J et al.Computers in human behavior. 2003, Vol 19, Num 3, pp 355-382, issn 0747-5632, 28 p.Article

Anonymizing censorship resistant systemsSERJANTOV, Andrei.Lecture notes in computer science. 2002, pp 111-120, issn 0302-9743, isbn 3-540-44179-4, 10 p.Conference Paper

Mnemosyne: Peer-to-peer steganographic storageHAND, Steven; ROSCOE, Timothy.Lecture notes in computer science. 2002, pp 130-140, issn 0302-9743, isbn 3-540-44179-4, 11 p.Conference Paper

Unlinkable electronic coupon protocol with anonymity controlNAKANISHI, T; HARUNA, N; SUGIYAMA, Y et al.Lecture notes in computer science. 1999, pp 37-46, issn 0302-9743, isbn 3-540-66695-8Conference Paper

Traceable e-cashGEMMEL, P. S.IEEE spectrum. 1997, Vol 34, Num 2, pp 35-37, issn 0018-9235Article

Ring Signatures : Stronger Definitions, and Constructions without Random OraclesBENDER, Adam; KATZ, Jonathan; MORSELLI, Ruggero et al.Journal of cryptology. 2009, Vol 22, Num 1, pp 114-138, issn 0933-2790, 25 p.Article

Authorship attribution with thousands of candidate authorsKOPPEL, Moshe; SCHLER, Jonathan; ARGAMON, Shlomo et al.International ACM SIGIR conference on research and development in information retrieval. 2006, pp 659-660, isbn 1-59593-369-7, 1Vol, 2 p.Conference Paper

Games and the impossibility of realizable ideal functionalityDATTA, Anupam; DEREK, Ante; MITCHELL, John C et al.Lecture notes in computer science. 2006, pp 360-379, issn 0302-9743, isbn 3-540-32731-2, 1Vol, 20 p.Conference Paper

Optimized initiation phases for anonymous auction protocolsYOON, Eun-Jun; RYU, Eun-Kyung; YOO, Kee-Young et al.Lecture notes in computer science. 2005, pp 19-27, issn 0302-9743, isbn 3-540-27830-3, 9 p.Conference Paper

Quantum anonymous transmissionsCHRISTANDL, Matthias; WEHNER, Stephanie.Lecture notes in computer science. 2005, pp 217-235, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 19 p.Conference Paper

Amortized E-CashLISKOV, Moses; MICALI, Silvio.Lecture notes in computer science. 2002, pp 1-20, issn 0302-9743, isbn 3-540-44079-8, 20 p.Conference Paper

Gamete donation : a question of anonymityDE JONGE, Christopher; BARRATT, Christopher L. R.Fertility and sterility. 2006, Vol 85, Num 2, pp 500-501, issn 0015-0282, 2 p.Article

Klein bottle routing : An alternative to onion routing and mix networkKUN PENG; MANUEL, Juan NIETO; DESMEDT, Yvo et al.Lecture notes in computer science. 2006, pp 296-309, issn 0302-9743, isbn 3-540-49112-0, 1Vol, 14 p.Conference Paper

Security flaws in several group signatures proposed by popescuGUILIN WANG; QING, Sihan.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part III, 711-718Conference Paper

Gamete donation and anonymity. CommentariesTEMPLETON, A.British journal of obstetrics and gynaecology (Print). 1991, Vol 98, Num 4, pp 343-345, issn 0306-5456, 3 p.Article

L'anonymat est-il souhaitable ? = Is anonymity an acceptable option?BONNET, C.Archives de pédiatrie (Paris). 2003, Vol 10, pp 36s-39s, issn 0929-693X, SUP1Conference Paper

  • Page / 63