UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Rise and fall of surrogacy arrangements in Portugal (in the aftermath of decision n. 465/2019 of the Portuguese Constitutional Court) Journal article
Raposo,Vera Lúcia. Rise and fall of surrogacy arrangements in Portugal (in the aftermath of decision n. 465/2019 of the Portuguese Constitutional Court)[J]. BioLaw Journal, 2020, 2020(1), 339-354.
Authors:  Raposo,Vera Lúcia
Favorite | TC[WOS]:3 TC[Scopus]:7 | Submit date:2020/12/04
Constitutional Court  Contract Law  Donor's Anonymity  Right To Regret  Surrogacy Contracts  
Does Church Size Matter? A Cross-Sectional and Longitudinal Study of Chinese Congregants’ Religious Attitudes and Behaviors Journal article
Cheung,Sing Hang, Hui,C. Harry, Lau,Esther Yuet Ying, Cheung,Shu Fai, Mok,Doris Shui Ying. Does Church Size Matter? A Cross-Sectional and Longitudinal Study of Chinese Congregants’ Religious Attitudes and Behaviors[J]. Review of Religious Research, 2015, 57(1), 63-86.
Authors:  Cheung,Sing Hang;  Hui,C. Harry;  Lau,Esther Yuet Ying;  Cheung,Shu Fai;  Mok,Doris Shui Ying
Favorite | TC[WOS]:6 TC[Scopus]:7 | Submit date:2019/06/25
Anonymity  Church Size  Economies Of Scale  Religious Attitudes  Religious Behavior  Spiritual Development  
Protocol-level attacks against Tor Journal article
Ling Z., Luo J., Yu W., Fu X., Jia W., Zhao W.. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4), 869-886.
Authors:  Ling Z.;  Luo J.;  Yu W.;  Fu X.;  Jia W.; et al.
Favorite | TC[WOS]:19 TC[Scopus]:30  IF:4.4/4.4 | Submit date:2019/02/11
Anonymity  Mix Networks  Protocol-level Attacks  Tor  
Attacking anonymous web browsing at local area networks through browsing dynamics Journal article
Yu S., Zhou W., Jia W., Hu J.. Attacking anonymous web browsing at local area networks through browsing dynamics[J]. COMPUTER JOURNAL, 2012, 55(4), 410-421.
Authors:  Yu S.;  Zhou W.;  Jia W.;  Hu J.
Favorite | TC[WOS]:5 TC[Scopus]:7  IF:1.5/1.5 | Submit date:2019/02/11
Anonymity  Attack  Hidden Markov Chain  Web Browsing  
An anonymous wireless authentication protocol based on proxy signature Journal article
Jiang C., Jia W., Gu K.. An anonymous wireless authentication protocol based on proxy signature[J]. Journal of Computational Information Systems, 2012, 8(2), 541-548.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymity  Authentication  Key exchange  Proxy signature