Suggested Topics within your search.
Suggested Topics within your search.
-
1by Abu-Baker Alkalaaf, Howida“... extends pseudonyms algorithm which has been implemented for resolving privacy protection problems...”
Published 2014
Thesis -
2by Mat Nor, Fazli“... of users using attestation and pseudonymization technique with new proposed protocol, MyTrust...”
Published 2016
Get full text
Thesis -
3by Asadi, Ali“... Authentication (GSAA) have been proposed. These mechanisms are based on Group Signature (GS) and Pseudonym Public...”
Published 2016
Get full text
Thesis -
4
-
5by Nurul Fatehah, Abd Jalal“... qualitative study, where a single case study approach was used (in a company given the pseudonym FESB...”
Published 2022
Get full text
Get full text
Thesis -
6by Selvakumaran, Arokiasamy“.... Bhd., (pseudonym) where the department were poorly performing, employees are engaged in low motivation...”
Published 2014
Get full text
Thesis -
7by Mohd Ihsan, Fatimah“... pseudonym) MARA Junior Science College. The main objective was to explore facets of the hidden curriculum...”
Published 2010
Get full text
Thesis -
8by Te, Ah Theen“... activist and prolific writer who wrote under the pseudonym Luo Huasheng. Unlike many other writers, his...”
Published 2015
Get full text
Thesis -
9by Mohd Faiz, Nur Sofurah“... experiences of Malaysian academic staff at the Malaysian Technical University (MTU, a pseudonym)—a technical...”
Published 2014
Get full text
Thesis -
10
-
11
-
12