UM

Browse/Search Results:  1-10 of 17 Help

Selected(0)Clear Items/Page:    Sort:
How secure is mental health providers' electronic patient communication? An empirical investigation Journal article
Professional Psychology: Research and Practice, 2019,Volume: 46,Issue: 6,Page: 444-450
Authors:  Elhai,Jon D.;  Hall,Brian J.
Favorite  |  View/Download:4/0  |  Submit date:2019/06/25
Electronic Communication  Mental Health Providers  Mental Health Services  Mobile Devices  Technology  
Correlation-based traffic analysis attacks on anonymity networks Journal article
IEEE Transactions on Parallel and Distributed Systems, 2018,Volume: 21,Issue: 7,Page: 954-967
Authors:  Zhu, Ye;  Fu, Xinwen;  Graham, Bryan;  Bettati, Riccardo;  Zhao, Wei
Favorite  |  View/Download:7/0  |  Submit date:2018/11/06
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids Conference paper
2017 IEEE 36th International Performance Computing and Communications Conference, IPCCC 2017, San Diego, CA, United states, 1210, 2017 - 1212, 2017
Authors:  Li, Donghe;  Yang, Qingyu;  Yu, Wei;  An, Dou;  Yang, Xinyu;  Zhao, Wei
Favorite  |  View/Download:3/0  |  Submit date:2018/11/06
Internet gambling among community adults and university students in macao Journal article
Journal of Gambling Studies, 2017,Volume: 31,Issue: 3,Page: 643-657
Authors:  Wu,Anise M.S.;  Lai,Mark H.C.;  Tong,Kwok Kit
Favorite  |  View/Download:9/0  |  Submit date:2019/06/25
Addiction  Chinese  Internet  Pathological Gambling  Prevalence  
A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids Conference paper
Authors:  Li, Donghe;  Yang, Qingyu;  Yu, Wei;  An, Dou;  Yang, Xinyu;  Zhao, Wei;  IEEE
Favorite  |  View/Download:10/0  |  Submit date:2018/10/30
Smart grids/cyber-physical systems  strategy-proofness  privacy preservation  
How secure is mental health providers' electronic patient communication? An empirical investigation Journal article
Professional Psychology: Research and Practice, 2015,Volume: 46,Issue: 6,Page: 444-450
Authors:  Elhai,Jon D.;  Hall,Brian J.
Favorite  |  View/Download:3/0  |  Submit date:2019/07/12
Electronic communication  Mental health providers  Mental health services  Mobile devices  Technology  
Gender, gender identification and perceived gender discrimination: An examination of mediating processes in China Journal article
Equality, Diversity and Inclusion, 2015,Volume: 34,Issue: 8,Page: 650-665
Authors:  Foley,Sharon;  Ngo,Hang Yue;  Loi,Raymond;  Zheng,Xiaoming
Favorite  |  View/Download:9/0  |  Submit date:2019/08/01
Chinese Employees  Gender Bias  Gender Comparison  Gender Identification  Perceived Gender Discrimination  
Does Church Size Matter? A Cross-Sectional and Longitudinal Study of Chinese Congregants’ Religious Attitudes and Behaviors Journal article
Review of Religious Research, 2015,Volume: 57,Issue: 1,Page: 63-86
Authors:  Cheung,Sing Hang;  Hui,C. Harry;  Lau,Esther Yuet Ying;  Cheung,Shu Fai;  Mok,Doris Shui Ying
Favorite  |  View/Download:6/0  |  Submit date:2019/06/25
Anonymity  Church Size  Economies Of Scale  Religious Attitudes  Religious Behavior  Spiritual Development  
Anonymous authentication without home server in mobile roaming networks Journal article
Chinese Journal of Electronics, 2013,Volume: 22,Issue: 2,Page: 382-386
Authors:  Jiang C.;  Jia W.;  Gu K.;  Xu N.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Anonymous authentication  Group signature  Key exchange  Mobile roaming networks  
Protocol-level attacks against Tor Journal article
Computer Networks, 2013,Volume: 57,Issue: 4,Page: 869-886
Authors:  Ling Z.;  Luo J.;  Yu W.;  Fu X.;  Jia W.;  Zhao W.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
Anonymity  Mix networks  Protocol-level attacks  Tor