Basic Search / Search Result

  • Search Result: 37results Search Strategy: "Anonymity".ekeyword (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Data Security: Modified Privacy-Preserving Data Mining Algorithm

    2

    Kerberos Based Key Management with Anonymity for IoT Devices in Smart Hotel
    • Department of Computer Science and Information Engineering /105/ Master
    • Author: Kai-Ching Wang Advisor: Shin-Ming Cheng
    • Smart devices make our lives more convenient, and the hoteliers are trying to improve the comfort o…
    • Clicks: 245Downloads: 0
    • Full text public date 2022/08/29 (Intranet public)
    • Full text public date 2027/08/29 (Internet public)
    • Full text public date 2027/08/29 (National library)

    3

    Anonymous Roaming Authentication Scheme Based on Client Puzzles

    4

    Factors leading to intentions to use anonymous dating software: a utilitarian and hedonic perspective

    5

    New Password-based Remote Authentication Mechanism with User Anonymity
    • Department of Information Management /99/ Master
    • Author: Chung-Fa Lai Advisor: Tzong-Chen Wu
    • With the development of Internet and World Wide Web, more and more people access digital informatio…
    • Clicks: 185Downloads: 0
    • Full text public date 2016/06/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Anonymous Handover Authentication and Key Exchange Protocol for Mobile Wireless Network
    • Department of Information Management /110/ Master
    • Author: Jia-Wei Kao Advisor: Tzong-Chen Wu
    • Traditional handover authentication mechanisms are mostly concerned with mutual authentication and …
    • Clicks: 165Downloads: 0
    • Full text public date 2024/09/24 (Intranet public)
    • Full text public date 2024/09/24 (Internet public)
    • Full text public date 2024/09/24 (National library)

    7

    Path Hiding Anonymity System Based on Programmable Data Plane Switches
    • Department of Computer Science and Information Engineering /109/ Master
    • Author: Yi-Cheng Li Advisor: Shan-Hsiang Shen
    • Communicating on the Internet anonymously often comes at the cost of inconvenience to the user. Mos…
    • Clicks: 137Downloads: 0
    • Full text public date 2024/08/09 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Four Character Which Play by Youth Users on Social Media

    9

    Multiple Queries Obfuscation for Privacy Protection in Location-Based Services

    10

    Anonymous Mobile Payment Protocol Using ECC-based Self-certified Public Key System