Login / Signup
An Anonymity Scheme Based on Pseudonym in P2P Networks.
Hao Peng
Songnian Lu
Jianhua Li
Aixin Zhang
Dandan Zhao
Published in:
e-Forensics (2010)
Keyphrases
</>
peer to peer
detection scheme
privacy protection
payment scheme
data sets
learning scheme
representation scheme
secret sharing
recognition scheme
trusted third party
electronic cash
ring signature scheme