Works matching Anonymity
Results: 5000
Tor network anonymity evaluation based on node anonymity.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00191-8
- By:
- Publication type:
- Article
O ANONIMATO COMO UM NOVO CONCEITO DE INTIMIDADE E PROTEÇÃO DOS DIREITOS DA PERSONALIDADE: A ANTINOMIA ENTRE O USO DO ANONIMATO PARA FINS LÍCITOS E A VEDAÇÃO CONSTITUCIONAL AO ANONIMATO.
- Published in:
- Revista Jurídica Cesumar: Mestrado, 2022, v. 22, n. 2, p. 363, doi. 10.17765/2176-9184.2022v22n2.e11005
- By:
- Publication type:
- Article
基于混合聚类的k-匿名数据发布算法.
- Published in:
- Electronic Science & Technology, 2022, v. 35, n. 12, p. 78, doi. 10.16180/j.cnki.issn1007-7820.2022.12.011
- By:
- Publication type:
- Article
Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework.
- Published in:
- ETRI Journal, 2013, v. 35, n. 3, p. 501, doi. 10.4218/etrij.13.0112.0327
- By:
- Publication type:
- Article
I Like My Anonymity: An Empirical Investigation of the Effect of Multidimensional Review Text and Role Anonymity on Helpfulness of Employer Reviews.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 2, p. 853, doi. 10.1007/s10796-022-10268-3
- By:
- Publication type:
- Article
AN OVERVIEW OF p-SENSITIVE k-ANONYMITY MODELS FOR MICRODATA ANONYMIZATION.
- Published in:
- International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2012, v. 20, n. 6, p. 819, doi. 10.1142/S0218488512400259
- By:
- Publication type:
- Article
(k,g)-anonymity Model Based on Grey Relational Analysis.
- Published in:
- Journal of Grey System, 2014, v. 26, n. 2, p. 162
- By:
- Publication type:
- Article
基于网络行为匿名特征的 Tor 网络匿名度分析.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2017, v. 34, n. 9, p. 2808, doi. 10.3969/j.issn.1001-3695.2017.09.054
- By:
- Publication type:
- Article
New based on (p<sup>+</sup>, α)-sensitive k-anonymity enhanced privacy protection model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 11, p. 3465, doi. 10.3969/j.issn.1001-3695.2014.11.060
- By:
- Publication type:
- Article
Express information protection application based on K-anonymity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 555, doi. 10.3969/j.issn.1001-3695.2014.02.056
- By:
- Publication type:
- Article
Efficient Multi-Source Anonymity for Aggregated Internet of Vehicles Datasets.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 8, p. 3230, doi. 10.3390/app14083230
- By:
- Publication type:
- Article
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3131, doi. 10.32604/cmc.2024.059201
- By:
- Publication type:
- Article
Role Engagement and Anonymity in Synchronous Online Role Play.
- Published in:
- International Review of Research in Open & Distance Learning, 2011, v. 12, n. 5, p. 57, doi. 10.19173/irrodl.v12i5.923
- By:
- Publication type:
- Article
Increasing anonymity in peer assessment by using classroom response technology within face-to-face higher education.
- Published in:
- Studies in Higher Education, 2015, v. 40, n. 1, p. 178, doi. 10.1080/03075079.2013.823930
- By:
- Publication type:
- Article
DOES IT MATTER FOR CBDC DESIGN? PRIVACY-ANONYMITY PREFERENCES FROM THE SIDE OF HIERARCHIES AND EGALITARIAN CULTURAL PATTERNS.
- Published in:
- Economics: Innovative & Economic Research Journal / Casopis za Ekonomsku Teoriju i Analizu, 2022, v. 10, n. 1, p. 35, doi. 10.2478/eoik-2022-0008
- By:
- Publication type:
- Article
Information-Sharing Behavior on WeChat Moments: The Role of Anonymity, Familiarity, and Intrinsic Motivation.
- Published in:
- Frontiers in Psychology, 2019, v. 10, p. 1, doi. 10.3389/fpsyg.2019.02540
- By:
- Publication type:
- Article
Analytics on Anonymity for Privacy Retention in Smart Health Data †.
- Published in:
- Future Internet, 2021, v. 13, n. 11, p. 274, doi. 10.3390/fi13110274
- By:
- Publication type:
- Article
Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 5, p. 847, doi. 10.3390/sym14050847
- By:
- Publication type:
- Article
THE ROLE OF ANONYMITY IN THE EFFECTS OF INADVERTENT EXPOSURE TO ONLINE PORNOGRAPHY AMONG YOUNG ADULT MALES.
- Published in:
- Social Behavior & Personality: an international journal, 2014, v. 42, n. 5, p. 823, doi. 10.2224/sbp.2014.42.5.823
- By:
- Publication type:
- Article
Anonymity and openness and the recruitment of gamete donors. Part I: semen donors.
- Published in:
- Human Fertility, 2007, v. 10, n. 3, p. 151, doi. 10.1080/14647270601110298
- By:
- Publication type:
- Article
How Should Complainer Anonymity for Sexual Offences be Introduced in Scotland? Learning the International Lessons of #Letherspeak.
- Published in:
- Edinburgh Law Review, 2022, v. 26, n. 3, p. 355, doi. 10.3366/elr.2022.0783
- By:
- Publication type:
- Article
Impact of Anonymity on Consumers' Online Reviews.
- Published in:
- Psychology & Marketing, 2021, v. 38, n. 12, p. 2259, doi. 10.1002/mar.21565
- By:
- Publication type:
- Article
Public anonymity and the connected world.
- Published in:
- Ethics & Information Technology, 2014, v. 16, n. 3, p. 207, doi. 10.1007/s10676-014-9346-5
- By:
- Publication type:
- Article
Anonymity in Dealer-to-Customer Markets.
- Published in:
- International Journal of Financial Studies, 2024, v. 12, n. 4, p. 119, doi. 10.3390/ijfs12040119
- By:
- Publication type:
- Article
The Masks We Wear: Watchmen, Infrastructural Racism, and Anonymity.
- Published in:
- Television & New Media, 2023, v. 24, n. 3, p. 247, doi. 10.1177/15274764221104995
- By:
- Publication type:
- Article
An empirical review of anonymity effects in peer assessment, peer feedback, peer review, peer evaluation and peer grading.
- Published in:
- Assessment & Evaluation in Higher Education, 2019, v. 44, n. 8, p. 1253, doi. 10.1080/02602938.2019.1600186
- By:
- Publication type:
- Article
The role of anonymity in peer assessment.
- Published in:
- Assessment & Evaluation in Higher Education, 2017, v. 42, n. 4, p. 645, doi. 10.1080/02602938.2016.1174766
- By:
- Publication type:
- Article
The Names of the Dead: Identity, Privacy and the Ethics of Anonymity in Exhibiting the Dead Body.
- Published in:
- Public Archaeology, 2023, v. 22, n. 1, p. 1, doi. 10.1080/14655187.2023.2268384
- By:
- Publication type:
- Article
Beyond anonymity: temporality and the production of knowledge in a qualitative longitudinal study.
- Published in:
- International Journal of Social Research Methodology, 2015, v. 18, n. 3, p. 281, doi. 10.1080/13645579.2015.1017901
- By:
- Publication type:
- Article
PERCEIVED ANONYMITY AND CYBERBULLYING: WHAT HAPPENS WHEN THERE IS A LACK OF SOCIAL INFLUENCE?
- Published in:
- Croatian Review of Rehabilitation Research / Hrvatska Revija za Rehabilitacijska Istraživanja, 2023, v. 59, n. 2, p. 31, doi. 10.31299/hrri.59.2.3
- By:
- Publication type:
- Article
Partial -Anonymity for Privacy-Preserving Social Network Data Publishing.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2017, v. 27, n. 1, p. 71, doi. 10.1142/S0218194017500048
- By:
- Publication type:
- Article
Anonymity in Blended Learning: Who Would You Like to Be?
- Published in:
- Educational Technology & Society, 2011, v. 14, n. 2, p. 175
- By:
- Publication type:
- Article
Anonymity in Computer-Mediated Communication: More Contrarian Ideas with Less Influence.
- Published in:
- Group Decision & Negotiation, 2014, v. 23, n. 4, p. 765, doi. 10.1007/s10726-012-9318-2
- By:
- Publication type:
- Article
Enhancing data utility in differential privacy via microaggregation-based $$k$$ -anonymity.
- Published in:
- VLDB Journal International Journal on Very Large Data Bases, 2014, v. 23, n. 5, p. 771, doi. 10.1007/s00778-014-0351-4
- By:
- Publication type:
- Article
ENTANGLEMENTS IN PRACTICE: PERFORMING ANONYMITY THROUGH SOCIAL MEDIA.
- Published in:
- MIS Quarterly, 2014, v. 38, n. 3, p. 873
- By:
- Publication type:
- Article
Gamete donor anonymity and limits on numbers of offspring: the views of three stakeholders.
- Published in:
- Journal of Law & the Biosciences, 2016, v. 3, n. 1, p. 39, doi. 10.1093/jlb/lsv045
- By:
- Publication type:
- Article
The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.
- Published in:
- Research Ethics, 2021, v. 17, n. 4, p. 480, doi. 10.1177/17470161211018257
- By:
- Publication type:
- Article
Exceptions to blanket anonymity for the publication of interviews with refugees: African refugees in Israel as a case study.
- Published in:
- Research Ethics, 2013, v. 9, n. 3, p. 121, doi. 10.1177/1747016113481176
- By:
- Publication type:
- Article
Presidential Anonymity: Rhetorical Identity Management and the Mystification of Political Reality.
- Published in:
- Communication Quarterly, 1991, v. 39, n. 3, p. 272, doi. 10.1080/01463379109369803
- By:
- Publication type:
- Article
Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 3, p. 157, doi. 10.3390/info14030157
- By:
- Publication type:
- Article
Anonymity and Inhibition in Newspaper Comments.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 106, doi. 10.3390/info12030106
- By:
- Publication type:
- Article
Anonimato e eliminativismo.
- Published in:
- Arte & Ensaio, 2024, v. 30, n. 48, p. 253, doi. 10.60001/ae.n48.13
- By:
- Publication type:
- Article
The evolution of anonymity in The Economist.
- Published in:
- Media History, 2022, v. 28, n. 1, p. 111, doi. 10.1080/13688804.2021.1888703
- By:
- Publication type:
- Article
Self-exploration, anonymity and risks in the online setting: analysis of narratives by 14–18-year olds.
- Published in:
- Journal of Youth Studies, 2014, v. 17, n. 8, p. 1097, doi. 10.1080/13676261.2014.881988
- By:
- Publication type:
- Article
Security Flaws in Authentication Protocols with Anonymity for Wireless Environments.
- Published in:
- ETRI Journal, 2009, v. 31, n. 4, p. 460, doi. 10.4218/etrij.09.0209.0026
- By:
- Publication type:
- Article
Impact of Anonymity on Information Sharing through Internal Psychological Processes: A Case of South Korean Online Communities.
- Published in:
- Journal of Global Information Management, 2014, v. 22, n. 3, p. 57, doi. 10.4018/jgim.2014070103
- By:
- Publication type:
- Article
Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 6, p. 1121
- By:
- Publication type:
- Article
Anonymity, Confidentiality, Privacy, and Identity: The Ties That Bind and Break in Communication Research.
- Published in:
- Review of Communication, 2014, v. 14, n. 1, p. 36, doi. 10.1080/15358593.2014.942351
- By:
- Publication type:
- Article
Anonymity as a Moderator of the Relationship Between FoMO (Fear of Missing Out) and Psychological Well-Being.
- Published in:
- Psychological Reports, 2023, v. 126, n. 5, p. 2303, doi. 10.1177/00332941231180115
- By:
- Publication type:
- Article
k-Degree anonymity on directed networks.
- Published in:
- Knowledge & Information Systems, 2019, v. 61, n. 3, p. 1743, doi. 10.1007/s10115-018-1251-5
- By:
- Publication type:
- Article