Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Anonymat")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1819

  • Page / 73
Export

Selection :

  • and

Local view attack on anonymous communicationGOGOLEWSKI, Marcin; KLONOWSKI, Marek; KUTYLOWSKI, Miroslaw et al.Lecture notes in computer science. 2005, pp 475-488, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 14 p.Conference Paper

Sur le « banal » et le « quelconque »BRETON, S.Les Cahiers de Fontenay. 1989, Num 55-56-57, pp 315-324, issn 0395-8418, 370Article

DE L'ANONYMAT DANS LE TRAITEMENT DES DONNÉES DE SANTÉVULLIET-TAVERNIER, Sophie.Médecine & droit. 2010, Num 100-101, pp 22-25, issn 1246-7391, 4 p.Article

Was Pro-Poor Economic Growth in Australia for the Income-Poor? And for the Multidimensionally-Poor?AZPITARTE, Francisco.Social indicators research. 2014, Vol 117, Num 3, pp 871-905, issn 0303-8300, 35 p.Article

Nous sommes attachés à l'anonymat car il libère la parole [Interview]DANGAIX, Denis; CHAUMEIL-GUEGUEN, Isabelle.La Santé de l'homme. 2012, Num 422, issn 0151-1998, 32Article

Is voting a private matter?STURGIS, Daniel.Journal of social philosophy. 2005, Vol 36, Num 1, pp 18-30, issn 0047-2786, 13 p.Article

La téléphonie réduit les distances, l'anonymat permet la liberté d'échange [Interview]DANGAIX, Denis; BACQUERIE, Mirentxu.La Santé de l'homme. 2012, Num 422, pp 31-32, issn 0151-1998, 2 p.Article

GAP: Practical anonymous networkingBENNETT, Krista; GROTHOFF, Christian.Lecture notes in computer science. 2003, pp 141-160, issn 0302-9743, isbn 3-540-20610-8, 20 p.Conference Paper

À la conquête de l'OlympeDAWAN, Daniel.Communications (Paris. 1962). 2012, Num 91, pp 29-41, issn 0588-8018, 13 p.Article

les questions d'anonymisation sur internetFROCHOT, Didier.Archimag (Vincennes). 2012, Num 254, pp 35-36, issn 0769-0975, 2 p.Article

Bioéthique. Le don de gamète en question. OpinionsRIGAUD, N.SCIENCE ET SANTE. 2011, Num 2, pp 42-43, issn 2119-9051, 2 p.Article

HACKER VAILLANT: Prince de l'impossible = THE VALIANT HACKER. PRINCE OF THE IMPOSSIBLECORNALBA, Vincent.Adolescence (Paris). 2013, Num 84, issn 0751-7696, 377-391, 485, 491 [17 p.]Article

Don anonyme, secret du don et symbolique = Anonymous gift, keeping it secret, and its symbolic valueDUDKIEWICZ-SIBONY, C.Andrologie (Lille). 2010, Vol 20, Num 1, pp 68-71, issn 1166-2654, 4 p.Article

Secret et anonymat du don de gamètes = Secrecy and anonymity in gametes donationLE LANNOU, D.Gynécologie obstétrique & fertilité. 2010, Vol 38, Num 5, pp 324-331, issn 1297-9589, 8 p.Article

Comment saisir la justice ?HAFIZ, Chems-Eddine.DROIT DEONTOLOGIE SOIN. 2013, Vol 13, Num 4, pp 501-508, issn 1629-6583, 8 p.Article

An Experimental Study and Analysis of Crowds based AnonymityKUMAR BHOOBALAN, Lokesh; HARSH, Piyush.Internet computing. International conferenceWorldComp'2011. 2011, pp 30-34, isbn 1-60132-186-4, 5 p.Conference Paper

Convertible ring signatureLEE, K.-C; WEN, H.-A; HWANG, T et al.IEE proceedings. Communications. 2005, Vol 152, Num 4, pp 411-414, issn 1350-2425, 4 p.Article

An efficient anonymous scheme for secure micropaymentsPAYERAS-CAPELLA, Magdalena; FERRER-GOMILA, Josep Lluis; HUGUET-ROTGER, Ll et al.Lecture notes in computer science. 2003, pp 80-83, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

Philosophical dimensions of anonymity in group support systems: Ethical implications of social psychological consequencesKLEIN, Esther E; CLARK, Chalmers C; HERSKOVITZ, Paul J et al.Computers in human behavior. 2003, Vol 19, Num 3, pp 355-382, issn 0747-5632, 28 p.Article

Anonymizing censorship resistant systemsSERJANTOV, Andrei.Lecture notes in computer science. 2002, pp 111-120, issn 0302-9743, isbn 3-540-44179-4, 10 p.Conference Paper

Online Chat - a Hatchery of Lies? Towards an Ethiral Analysis of Truth and Lying in Internet ChatroomsHOLDERIED-MILIS, Victoria.Ethical perspectives - Katholieke Universiteit Leuven. 2010, Vol 17, Num 1, pp 95-118, issn 1370-0049, 24 p.Article

Ring Signatures : Stronger Definitions, and Constructions without Random OraclesBENDER, Adam; KATZ, Jonathan; MORSELLI, Ruggero et al.Journal of cryptology. 2009, Vol 22, Num 1, pp 114-138, issn 0933-2790, 25 p.Article

LA FLÂNERIE : UN MOMENT DE LA FÊLURE ET DU MÉLANGESHIN, Ji-Eun.Sociétés (Paris). 2008, Num 100, pp 91-107, issn 0765-3697, 17 p.Article

Authorship attribution with thousands of candidate authorsKOPPEL, Moshe; SCHLER, Jonathan; ARGAMON, Shlomo et al.International ACM SIGIR conference on research and development in information retrieval. 2006, pp 659-660, isbn 1-59593-369-7, 1Vol, 2 p.Conference Paper

Games and the impossibility of realizable ideal functionalityDATTA, Anupam; DEREK, Ante; MITCHELL, John C et al.Lecture notes in computer science. 2006, pp 360-379, issn 0302-9743, isbn 3-540-32731-2, 1Vol, 20 p.Conference Paper

  • Page / 73