Browsing by Subject "anonymity"

Sort by: Order: Results:

  • Unknown author (IEEE, 2011)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (IAJIT -The International Arab Journal of Information Technology, 2016-10)
    In service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc., To protect the privacy of users, their real identities should not be linked to ...