Skip to search formSkip to main contentSkip to account menu

Request for Remain Anonymous - Consent Type

Known as: Request for Remain Anonymous 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Data access control is an efficient way to provide the data security in the cloud but due to data outsourcing over untrusted… 
2016
2016
For the information security issues of cloud computing, this paper studys the security management methods of cloud computing… 
2011
2011
With the improvement of firewall technology,it is hard for a Trojan to steal and transmit outside the user's data.Nowadays… 
2010
2010
Anonymous Router (AR) is a key issue of Network Topology. Aiming at the deficiency of previous research, this paper proposes an… 
2009
2009
Ring signcryption, a cryptographic primitive to protect security and privacy, is an encryption and authentication scheme in a… 
2008
2008
Mobile ad hoc networks or MANETs are supposed to play an important role in future military communication. MANETs offer quickly… 
2005
2005
. An educational game is a recreational activity designed to teach people, typically children, about a certain subject or help… 
2004
2004
This poster pa er addresses the issue of impmving packet delivery for mu$icast in mobile, ad hoc networks and pmposes a reliabili… 
2002
2002
Objectives: To compare non-treatment decision making by general practitioners and geriatricians in response to vignettes. To see…