Security arrangements; Authentication; Protecting privacy or anonymity {specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks}