Search

Your search keyword '"Pseudonymity"' showing total 504 results

Search Constraints

Start Over You searched for: Descriptor "Pseudonymity" Remove constraint Descriptor: "Pseudonymity"
504 results on '"Pseudonymity"'

Search Results

1. Pseudonymity

6. TO GRANT OR NOT TO GRANT: THE SELF-CHARACTERIZATION OF MOSES IN DEUTERONOMY 3:12-26.

7. A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms

9. The Amanuensis Hypothesis in New Testament Scholarship: Its Origin, Evidential Basis, and Application.

10. Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

12. Classifying Transactional Addresses using Supervised Learning Approaches over Ethereum Blockchain.

13. Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric

14. Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks

15. Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones

16. Ferrante en Vergilius: Het voordeel van een verborgen auteur.

17. O PSEUDONIMATO COMO PRÁTICA DEMOCRÁTICA PARA A CONSTRUÇÃO DO DISCURSO DE EXTIMIDADE COM CONTEÚDO A FAVOR DA VACINAÇÃO CONTRA A COVID-19.

20. The Alleged 'Letter Allegedly from Us': The Parallel Function of ὡς δι' ἡμῶν in 2 Thessalonians 2.2.

21. Privacy-Preserving Authentication in VANETs

22. Systems for Digital Self-Sovereignty

23. Periodical Queries: Early American Magazine Writing in and out of the Charles Brockden Brown Canon.

24. Privacy Patterns for Pseudonymity

25. What's in a (pseudo)name? Ethical conundrums for the principles of anonymisation in social media research.

26. Reconsidering the John of Revelation.

32. mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies

33. An Obligation of Thanks (2Thess 1,3): Gift and Return in Divine-Human Relationships.

34. MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data

35. Iron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites

36. Pseudonymity, authorship, selfhood : the names and lives of Charlotte Brontë and George Eliot

37. A theory of optimum cryptocurrency scope.

38. RAIAP: renewable authentication on isolated anonymous profiles: A GDPR compliant self-sovereign architecture for distributed systems.

39. Underground testing: Name‐altering practices as probes in electronic music.

44. Improving Air Interface User Privacy in Mobile Telephony

46. Mind Your Social Media Manners: Pseudonymity, Imaginary Audience, and Incivility on Facebook vs. YouTube.

48. What’s holding back blockchain finance? On the possibility of decentralized autonomous finance

Catalog

Books, media, physical & digital resources