Search

Your search keyword '"Pseudonymity"' showing total 504 results

Search Constraints

Start Over You searched for: Descriptor "Pseudonymity" Remove constraint Descriptor: "Pseudonymity"
504 results on '"Pseudonymity"'

Search Results

101. Impact of Anonymity on Information Sharing through Internal Psychological Processes: A Case of South Korean Online Communities.

102. Reforming the traditional business network

103. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy

104. Avatars, Disconnecting Agents: Exploring the Nuances of the Avatar Effect in Online Discourse

105. The Failure of Self-Knowledge: Despair and the Limit of Reason in Kierkegaard's Philosophy

107. The Authorship of the Pseudo-Dionysian Corpus: A Deliberate Forgery or Clever Literary Ploy? by Vladimir Kharlamov

108. Making the Case for Anonymity in E-Participation - An Evaluation of Real Name Policy in Gütersloh’s Second Participatory Budget

109. Venus förvisning och återkomst

110. Hiding in Plain Sight: Pseudonymity and Participation in Legal Mobilization

112. X

113. Resolving polysemy and pseudonymity in entity linking with comprehensive name and context modeling.

114. The Key to Intelligent Transportation Systems: Identity and Credential Management for Secure and Privacy-Preserving Vehicular Communication Systems

115. The Open Legal Challenges of Pursuing AML/CFT Accountability within Privacy-Enhanced IoM Ecosystems

116. THE HIDDEN AUTHOR OF THE CORPUS DIONYSIACUM - AUTHENTICITY, REJECTION, AND APOPHASIS IN HISTORICAL CONTEXT.

117. Prêts-Noms. Politique du métonyme.

118. Pseudonymity

119. What is in a Name? The Hermeneutics of Authorship Analysis Concerning Colossians.

120. ПРОБЛЕМИ НА ПОНЯТИЕТО ЗА АВТОРСТВО В УИКИПЕДИЯ

121. Making the Case for Anonymity in E-Participation.

122. Who is the author of The Point of View? Issues of authorship in the posthumous Kierkegaard.

123. Virtual network stacks: from theory to practice.

124. Secure and anonymous decentralized Bitcoin mixing

125. Missing ‘Particles’ in Disputed Pauline Letters? A Question of Method

126. Scalable Private Set Intersection Based on OT Extension

127. Anonymity Leakage in Private VoIP Networks

128. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN.

129. LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X

130. What's happened to PETs?

131. Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks.

132. Psychic ID: A blueprint for a modern national identity scheme.

133. Image, Identity and Pseudonymity in Online Discussions.

134. Anonymity, Pseudonymity, and Deliberation: Why Not Everything Should Be Connected

135. From usernames to profiles: the development of pseudonymity in Internet communication

136. Pseudonymity, Gnosis, and the Self in Gnostic Literature

137. Do authors and performers have a legal right to pseudonymity?

138. Beyond ‘pseudonymity’: The sociotechnical structure of online military forums

139. Zwischen Mythos und Wahrheit: Neue Perspektiven auf die sogenannten Pastoralbriefe

140. Integrity and dissemination control in administrative applications through information designators.

141. Evidence processing and privacy issues in evidence-based reputation systems

142. Towards Pseudonymous e-Commerce.

143. Deanonymizing Tor hidden service users through Bitcoin transactions analysis

144. Fluids on Pictures on Screens: Pseudonymous Affect on Reddit’s TributeMe

145. ‘On the internet, there is no women-only space’: Male Power in Digital Networks

146. The Internet of Money between Anonymity and Publicity: Legal Challenges of Distributed Ledger Technologies in the Crypto Financial Landscape

147. Blockchain-Based Secure E-Voting with the Assistance of Smart Contract

148. Authenticating Deeds/Organizing Society Considerations for Blockchain-Based Land Registries

149. Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services

150. Explaining Cybersecurity with Films and the Arts

Catalog

Books, media, physical & digital resources