Peer review and anonymity

被引:0
|
作者
Gresty, MA
机构
关键词
D O I
暂无
中图分类号
R74 [神经病学与精神病学];
学科分类号
摘要
引用
收藏
页码:281 / 282
页数:2
相关论文
共 50 条
  • [31] Responder anonymity and anonymous peer-to-peer file sharing
    Scarlata, V
    Levine, BN
    Shields, C
    NETWORK PROTOCOLS, 2001, : 272 - 280
  • [32] Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems
    Imran Memon
    Kamenyi Domenic
    Hina Memon
    Rizwan Akhtar
    Wang Yong
    Fengli Zhang
    Wireless Personal Communications, 2014, 79 : 647 - 660
  • [33] Mutual anonymity Protocols for hybrid peer-to-peer systems
    Li, X
    Xu, ZC
    Zhang, XD
    23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 68 - 75
  • [34] An efficient protocol for peer-to-peer file sharing with mutual anonymity
    Ye, BL
    Zhou, JY
    Zhang, Y
    Cao, JN
    Chen, DX
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 665 - 670
  • [35] Some issues regarding search, censorship, and anonymity in peer to peer networks
    Fiat, A
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2003, 2719 : 33 - 33
  • [36] GARM: A group - Anonymity reputation model in peer-to-peer system
    Ji, Wen
    Yang, Shoubao
    Wei, Dong
    Lu, Weina
    SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 481 - +
  • [37] The influence of peer honesty and anonymity on managerial reporting
    Schwering A.
    Journal of Business Economics, 2017, 87 (9) : 1151 - 1172
  • [38] SHOULD PEER REVIEWERS SHED THE MASK OF ANONYMITY
    NEETENS, A
    NEURO-OPHTHALMOLOGY, 1995, 15 (03) : 109 - 109
  • [39] Peer-to-Peer (P2P) Electricity Trading with Anonymity
    Ranasinghe, Sasanka N.
    Pussewalage, Harsha S. Gardiyawasam
    Chakravorty, Antorweep
    16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
  • [40] Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    Tsai K.-Y.
    Hsu C.-L.
    Wu T.-C.
    International Journal of Security and Networks, 2010, 5 (01) : 45 - 52