X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (5292) 5292
Conference Proceeding (2178) 2178
Book Chapter (352) 352
Newspaper Article (189) 189
Dissertation (185) 185
Magazine Article (110) 110
Book Review (34) 34
Book / eBook (30) 30
Government Document (22) 22
Publication (20) 20
Trade Publication Article (17) 17
Web Resource (15) 15
Report (9) 9
Paper (8) 8
Newsletter (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
anonymity (6103) 6103
privacy (2455) 2455
k-anonymity (1077) 1077
computer science, information systems (1019) 1019
security (948) 948
authentication (821) 821
telecommunications (640) 640
internet (620) 620
computer science (613) 613
engineering, electrical & electronic (603) 603
analysis (599) 599
cryptography (494) 494
data privacy (425) 425
computer science, theory & methods (382) 382
protocols (380) 380
algorithms (366) 366
studies (336) 336
humans (325) 325
protocol (302) 302
social networks (302) 302
communication (289) 289
location privacy (289) 289
servers (285) 285
networks (267) 267
computer science, software engineering (256) 256
encryption (254) 254
confidentiality (247) 247
user anonymity (247) 247
computer communication networks (242) 242
computer science, hardware & architecture (241) 241
computer science, artificial intelligence (238) 238
economics (222) 222
management (209) 209
research (205) 205
ethics (204) 204
data security (199) 199
methods (197) 197
data mining (193) 193
identity (192) 192
scheme (192) 192
computer security (187) 187
behavior (185) 185
smart cards (183) 183
english literature (180) 180
protection (180) 180
efficient (176) 176
usage (175) 175
public key (171) 171
wireless sensor networks (167) 167
wireless networks (166) 166
privacy protection (164) 164
anonymization (163) 163
computer-mediated communication (163) 163
location-based services (162) 162
information (160) 160
routing (159) 159
geheimhaltung (157) 157
smart card (157) 157
computer information security (156) 156
female (153) 153
male (147) 147
cloud computing (146) 146
disclosure (146) 146
authentifizierung (145) 145
mutual authentication (144) 144
trust (144) 144
mathematical models (142) 142
data encryption (141) 141
mobile communication (139) 139
privacy preservation (138) 138
technology (138) 138
secure (136) 136
key agreement (135) 135
access control (134) 134
cryptanalysis (134) 134
tor (134) 134
publishing (130) 130
sensors (130) 130
network security (126) 126
engineering (123) 123
authorship (118) 118
l-diversity (117) 117
computer science, interdisciplinary applications (115) 115
psychology, multidisciplinary (113) 113
computer simulation (111) 111
conferences (110) 110
information systems (110) 110
clustering (109) 109
fairness (109) 109
games (109) 109
social media (108) 108
artificial intelligence (107) 107
computer networks (107) 107
verschlüsselung (106) 106
information science & library science (104) 104
information security (102) 102
medical informatics (102) 102
online (100) 100
communications engineering, networks (99) 99
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (7866) 7866
French (152) 152
Japanese (145) 145
Korean (86) 86
Spanish (71) 71
German (67) 67
Chinese (45) 45
Czech (29) 29
Portuguese (26) 26
Swedish (15) 15
Italian (8) 8
Croatian (6) 6
Hungarian (5) 5
Russian (5) 5
Polish (4) 4
Slovak (4) 4
Turkish (4) 4
Catalan (3) 3
Danish (3) 3
Norwegian (3) 3
Dutch (2) 2
Hebrew (2) 2
Persian (2) 2
Romanian (2) 2
Slovenian (2) 2
Afrikaans (1) 1
Arabic (1) 1
Estonian (1) 1
Indonesian (1) 1
Lithuanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computer Communications, ISSN 0140-3664, 2010, Volume 33, Issue 4, pp. 420 - 431
Anonymous communications aim to preserve communications privacy within the shared public network environment. It can provide security well beyond content... 
Recipient anonymity | Communication anonymity | Sender anonymity | Source anonymous message authentication | Relationship anonymity | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | MIX | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
ACM Transactions on Knowledge Discovery from Data (TKDD), ISSN 1556-4681, 03/2007, Volume 1, Issue 1, pp. 3 - es
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy... 
Data privacy | diversity | k -anonymity | privacy-preserving data publishing | ℓ-diversity | Privacy-preserving data publishing | k-anonymity
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 03/2017, Volume 29, Issue 6, pp. np - n/a
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 06/2010, Volume 42, Issue 4, pp. 1 - 53
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 09/2017, Volume 74, pp. 375 - 384
The developments in positioning and mobile communication technology have made the location-based service (LBS) applications more and more popular. For privacy... 
Location-label | K-anonymity | Location-based service (LBS) | Location privacy | Sensitive location | FRAMEWORK | COMPUTER SCIENCE, THEORY & METHODS | ACHIEVING K-ANONYMITY | Privacy | Algorithms
Journal Article
Scientific reports, ISSN 2045-2322, 2013, Volume 3, Issue 1, p. 1376
We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a... 
ANONYMITY | MULTIDISCIPLINARY SCIENCES | NETWORKS | Geography | Privacy | Cell Phone | Humans | Databases as Topic | Mobility
Journal Article
Computers & Security, ISSN 0167-4048, 08/2018, Volume 77, pp. 488 - 499
Trajectory data often provides information that is well applicable to real-world scenarios such as traffic planning and location-based advertising. Individual... 
Trajectory privacy protection | Privacy requirement matrix | Time interval divided | Manhattan distance | Trajectory ki-anonymity set | anonymity set | Trajectory k | ANONYMIZATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | Trajectory k(i)-anonymity set | Computer science | Privacy | Privacy, Right of | Methods
Journal Article
Knowledge and information systems, ISSN 0219-3116, 2010, Volume 28, Issue 1, pp. 47 - 77
Journal Article
IEEE/ACM transactions on networking, ISSN 1558-2566, 2018, Volume 26, Issue 2, pp. 1018 - 1032
Journal Article
Organization studies, ISSN 1741-3044, 2016, Volume 28, Issue 3, pp. 377 - 408
Online communities depend upon the commitment and voluntary participation of their members. Community design — site navigation, community structure and... 
Design | Online community | Common bond | Common identity | Member attachment | ANONYMITY | ATTACHMENT | MANAGEMENT | online community | INTERNET | member attachment | SELF | MODEL | IDENTIFICATION | common identity | SOCIAL IDENTITY | design | COMPUTER-MEDIATED COMMUNICATION | INTERPERSONAL-ATTRACTION | CATEGORIZATION | common bond | Knowledge management | Information management | Methods | Community
Journal Article
Journal of Machine Learning Research, ISSN 1532-4435, 11/2017, Volume 18
Preserving privacy of continuous and/or high-dimensional data such as images, videos and audios, can be challenging with syntactic anonymization methods which... 
Differential privacy | K-anonymity | Minimax optimization | Empirical risk minimization | Inference attack | LINEARIZATION | ANONYMITY | minimax optimization | inference attack | empirical risk minimization | differential privacy | AUTOMATION & CONTROL SYSTEMS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | k-anonymity
Journal Article
Proceedings of the 2013 conference on internet measurement conference, 10/2013, pp. 127 - 140
Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on a combination of... 
anonymity | bitcoin | measurement | Measurement | Anonymity | Bitcoin
Conference Proceeding
Journal of Network and Computer Applications, ISSN 1084-8045, 05/2017, Volume 86, pp. 34 - 45
With the fusion of social networks and location-based services, location sharing is one of the most important services in mobile online social networks... 
Anonymity | Friend attacks | Location privacy | Mobile online social networks | Location sharing | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | MOBISHARE | ACHIEVING K-ANONYMITY | Privacy | Algorithms | Online social networks
Journal Article
Mathematical and Computer Modelling, ISSN 0895-7177, 2012, Volume 55, Issue 1, pp. 35 - 44
In recent years, several user authentication schemes with smart cards for wireless communication environments have been proposed. In 2010, He, Ma, Zhang, Chen,... 
Smart cards | User anonymity | Remote user authentication | Wireless networks | Security | Mobile computing | MATHEMATICS, APPLIED | ANONYMITY | PROTOCOL | SECURITY ENHANCEMENT | EFFICIENT | Privacy | Integrated circuit cards
Journal Article
Journal of network and computer applications, ISSN 1084-8045, 2017, Volume 89, pp. 72 - 85
Journal Article