kw.\*:("Anonymat")
Results 1 to 25 of 1217
Selection :
Local view attack on anonymous communicationGOGOLEWSKI, Marcin; KLONOWSKI, Marek; KUTYLOWSKI, Miroslaw et al.Lecture notes in computer science. 2005, pp 475-488, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 14 p.Conference Paper
Is voting a private matter?STURGIS, Daniel.Journal of social philosophy. 2005, Vol 36, Num 1, pp 18-30, issn 0047-2786, 13 p.Article
les questions d'anonymisation sur internetFROCHOT, Didier.Archimag (Vincennes). 2012, Num 254, pp 35-36, issn 0769-0975, 2 p.Article
Bioéthique. Le don de gamète en question. OpinionsRIGAUD, N.SCIENCE ET SANTE. 2011, Num 2, pp 42-43, issn 2119-9051, 2 p.Article
Secret et anonymat du don de gamètes = Secrecy and anonymity in gametes donationLE LANNOU, D.Gynécologie obstétrique & fertilité. 2010, Vol 38, Num 5, pp 324-331, issn 1297-9589, 8 p.Article
Comment saisir la justice ?HAFIZ, Chems-Eddine.DROIT DEONTOLOGIE SOIN. 2013, Vol 13, Num 4, pp 501-508, issn 1629-6583, 8 p.Article
An Experimental Study and Analysis of Crowds based AnonymityKUMAR BHOOBALAN, Lokesh; HARSH, Piyush.Internet computing. International conferenceWorldComp'2011. 2011, pp 30-34, isbn 1-60132-186-4, 5 p.Conference Paper
Convertible ring signatureLEE, K.-C; WEN, H.-A; HWANG, T et al.IEE proceedings. Communications. 2005, Vol 152, Num 4, pp 411-414, issn 1350-2425, 4 p.Article
An efficient anonymous scheme for secure micropaymentsPAYERAS-CAPELLA, Magdalena; FERRER-GOMILA, Josep Lluis; HUGUET-ROTGER, Ll et al.Lecture notes in computer science. 2003, pp 80-83, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper
Philosophical dimensions of anonymity in group support systems: Ethical implications of social psychological consequencesKLEIN, Esther E; CLARK, Chalmers C; HERSKOVITZ, Paul J et al.Computers in human behavior. 2003, Vol 19, Num 3, pp 355-382, issn 0747-5632, 28 p.Article
Anonymizing censorship resistant systemsSERJANTOV, Andrei.Lecture notes in computer science. 2002, pp 111-120, issn 0302-9743, isbn 3-540-44179-4, 10 p.Conference Paper
Mnemosyne: Peer-to-peer steganographic storageHAND, Steven; ROSCOE, Timothy.Lecture notes in computer science. 2002, pp 130-140, issn 0302-9743, isbn 3-540-44179-4, 11 p.Conference Paper
Unlinkable electronic coupon protocol with anonymity controlNAKANISHI, T; HARUNA, N; SUGIYAMA, Y et al.Lecture notes in computer science. 1999, pp 37-46, issn 0302-9743, isbn 3-540-66695-8Conference Paper
Traceable e-cashGEMMEL, P. S.IEEE spectrum. 1997, Vol 34, Num 2, pp 35-37, issn 0018-9235Article
ITT au sens pénal... Enquête de pratique par autoquestionnaire anonyme = ITT with the penal direction..OUSTRIC, Stéphane; GRILL, Stéphane; TELMON, Norbert et al.La Revue du praticien (Paris). 2009, Vol 59, Num 8, pp 3-7, issn 0035-2640, 5 p., SUPArticle
NOTHING BUT DUST : A PHILOSOPHICAL APPROACH TO THE PROBLEM OF IDENTITY AND ANONYMITY IN SAMUEL BECKETT'S TRILOGYAILA, Maimaitiming.Philosophical forum. 2009, Vol 40, Num 1, pp 127-147, issn 0031-806X, 21 p.Article
Wenn zahle nix dann geht dir schlecht : Ein Experiment zu sprachlichen Verstellungsstrategien in Erpresserbriefen = If nothing is paid, than you're in trouble. An Experiment of Strategies for Linguistic Alteration in Extortion (Blackmail) Letters = Si rien n'est payé, alors vous êtes en difficulté. Une expérience de stratégies pour la modification linguistique dans les lettres d'extorsion (Blackmail)DERN, Christa.ZGL. Zeitschrift für germanistische Linguistik. 2008, Vol 36, Num 2, pp 240-265, issn 0301-3294, 26 p.Article
Unclonable group identificationDAMGARD, Ivan; DUPONT, Kasper; PEDERSEN, Michael Ostergaard et al.Lecture notes in computer science. 2006, pp 555-572, issn 0302-9743, isbn 3-540-34546-9, 1Vol, 18 p.Conference Paper
Verifier-local revocation group signature schemes with backward unlinkability from bilinear mapsNAKANISHI, Toru; FUNABIKI, Nobuo.Lecture notes in computer science. 2005, pp 533-548, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 16 p.Conference Paper
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticityCHOW, Sherman S. M; YIU, S. M; HUI, Lucas C. K et al.Lecture notes in computer science. 2004, pp 352-369, issn 0302-9743, isbn 3-540-21376-7, 18 p.Conference Paper
PRIVATE TALK: TESTIMONY, EVIDENCE, AND THE PRACTICE OF ANONYMIZATION IN RESEARCHBERKHOUT, Suze G.International journal of feminist approaches to bioethics (Print). 2013, Vol 6, Num 1, pp 19-45, issn 1937-4585, 27 p.Article
Reflexões em torno do conceito de anonimato = Reflecting upon the concept of anonymityFROIS, Catarina.Análise social. 2010, Num 194, pp 165-177, issn 0003-2573, 13 p.Article
L'anonymat est-il souhaitable ? = Is anonymity an acceptable option?BONNET, C.Archives de pédiatrie (Paris). 2003, Vol 10, pp 36s-39s, issn 0929-693X, SUP1Conference Paper
Anonymity without 'cryptography'MALKHI, Dahlia; PAVLOV, Elan.Lecture notes in computer science. 2002, pp 117-135, issn 0302-9743, isbn 3-540-44079-8, 19 p.Conference Paper
Building on a tradition of ethical consideration of the deadSUKOL, R. B.Human pathology. 1995, Vol 26, Num 7, pp 700-705, issn 0046-8177Article