Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Anonymat")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1217

  • Page / 49
Export

Selection :

  • and

Local view attack on anonymous communicationGOGOLEWSKI, Marcin; KLONOWSKI, Marek; KUTYLOWSKI, Miroslaw et al.Lecture notes in computer science. 2005, pp 475-488, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 14 p.Conference Paper

Is voting a private matter?STURGIS, Daniel.Journal of social philosophy. 2005, Vol 36, Num 1, pp 18-30, issn 0047-2786, 13 p.Article

les questions d'anonymisation sur internetFROCHOT, Didier.Archimag (Vincennes). 2012, Num 254, pp 35-36, issn 0769-0975, 2 p.Article

Bioéthique. Le don de gamète en question. OpinionsRIGAUD, N.SCIENCE ET SANTE. 2011, Num 2, pp 42-43, issn 2119-9051, 2 p.Article

Secret et anonymat du don de gamètes = Secrecy and anonymity in gametes donationLE LANNOU, D.Gynécologie obstétrique & fertilité. 2010, Vol 38, Num 5, pp 324-331, issn 1297-9589, 8 p.Article

Comment saisir la justice ?HAFIZ, Chems-Eddine.DROIT DEONTOLOGIE SOIN. 2013, Vol 13, Num 4, pp 501-508, issn 1629-6583, 8 p.Article

An Experimental Study and Analysis of Crowds based AnonymityKUMAR BHOOBALAN, Lokesh; HARSH, Piyush.Internet computing. International conferenceWorldComp'2011. 2011, pp 30-34, isbn 1-60132-186-4, 5 p.Conference Paper

Convertible ring signatureLEE, K.-C; WEN, H.-A; HWANG, T et al.IEE proceedings. Communications. 2005, Vol 152, Num 4, pp 411-414, issn 1350-2425, 4 p.Article

An efficient anonymous scheme for secure micropaymentsPAYERAS-CAPELLA, Magdalena; FERRER-GOMILA, Josep Lluis; HUGUET-ROTGER, Ll et al.Lecture notes in computer science. 2003, pp 80-83, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

Philosophical dimensions of anonymity in group support systems: Ethical implications of social psychological consequencesKLEIN, Esther E; CLARK, Chalmers C; HERSKOVITZ, Paul J et al.Computers in human behavior. 2003, Vol 19, Num 3, pp 355-382, issn 0747-5632, 28 p.Article

Anonymizing censorship resistant systemsSERJANTOV, Andrei.Lecture notes in computer science. 2002, pp 111-120, issn 0302-9743, isbn 3-540-44179-4, 10 p.Conference Paper

Mnemosyne: Peer-to-peer steganographic storageHAND, Steven; ROSCOE, Timothy.Lecture notes in computer science. 2002, pp 130-140, issn 0302-9743, isbn 3-540-44179-4, 11 p.Conference Paper

Unlinkable electronic coupon protocol with anonymity controlNAKANISHI, T; HARUNA, N; SUGIYAMA, Y et al.Lecture notes in computer science. 1999, pp 37-46, issn 0302-9743, isbn 3-540-66695-8Conference Paper

Traceable e-cashGEMMEL, P. S.IEEE spectrum. 1997, Vol 34, Num 2, pp 35-37, issn 0018-9235Article

ITT au sens pénal... Enquête de pratique par autoquestionnaire anonyme = ITT with the penal direction..OUSTRIC, Stéphane; GRILL, Stéphane; TELMON, Norbert et al.La Revue du praticien (Paris). 2009, Vol 59, Num 8, pp 3-7, issn 0035-2640, 5 p., SUPArticle

NOTHING BUT DUST : A PHILOSOPHICAL APPROACH TO THE PROBLEM OF IDENTITY AND ANONYMITY IN SAMUEL BECKETT'S TRILOGYAILA, Maimaitiming.Philosophical forum. 2009, Vol 40, Num 1, pp 127-147, issn 0031-806X, 21 p.Article

Wenn zahle nix dann geht dir schlecht : Ein Experiment zu sprachlichen Verstellungsstrategien in Erpresserbriefen = If nothing is paid, than you're in trouble. An Experiment of Strategies for Linguistic Alteration in Extortion (Blackmail) Letters = Si rien n'est payé, alors vous êtes en difficulté. Une expérience de stratégies pour la modification linguistique dans les lettres d'extorsion (Blackmail)DERN, Christa.ZGL. Zeitschrift für germanistische Linguistik. 2008, Vol 36, Num 2, pp 240-265, issn 0301-3294, 26 p.Article

Unclonable group identificationDAMGARD, Ivan; DUPONT, Kasper; PEDERSEN, Michael Ostergaard et al.Lecture notes in computer science. 2006, pp 555-572, issn 0302-9743, isbn 3-540-34546-9, 1Vol, 18 p.Conference Paper

Verifier-local revocation group signature schemes with backward unlinkability from bilinear mapsNAKANISHI, Toru; FUNABIKI, Nobuo.Lecture notes in computer science. 2005, pp 533-548, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 16 p.Conference Paper

Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticityCHOW, Sherman S. M; YIU, S. M; HUI, Lucas C. K et al.Lecture notes in computer science. 2004, pp 352-369, issn 0302-9743, isbn 3-540-21376-7, 18 p.Conference Paper

PRIVATE TALK: TESTIMONY, EVIDENCE, AND THE PRACTICE OF ANONYMIZATION IN RESEARCHBERKHOUT, Suze G.International journal of feminist approaches to bioethics (Print). 2013, Vol 6, Num 1, pp 19-45, issn 1937-4585, 27 p.Article

Reflexões em torno do conceito de anonimato = Reflecting upon the concept of anonymityFROIS, Catarina.Análise social. 2010, Num 194, pp 165-177, issn 0003-2573, 13 p.Article

L'anonymat est-il souhaitable ? = Is anonymity an acceptable option?BONNET, C.Archives de pédiatrie (Paris). 2003, Vol 10, pp 36s-39s, issn 0929-693X, SUP1Conference Paper

Anonymity without 'cryptography'MALKHI, Dahlia; PAVLOV, Elan.Lecture notes in computer science. 2002, pp 117-135, issn 0302-9743, isbn 3-540-44079-8, 19 p.Conference Paper

Building on a tradition of ethical consideration of the deadSUKOL, R. B.Human pathology. 1995, Vol 26, Num 7, pp 700-705, issn 0046-8177Article

  • Page / 49