Search

Your search keyword '"Pseudonymity"' showing total 501 results

Search Constraints

Start Over You searched for: Descriptor "Pseudonymity" Remove constraint Descriptor: "Pseudonymity"
501 results on '"Pseudonymity"'

Search Results

1. Pseudonymity

6. TO GRANT OR NOT TO GRANT: THE SELF-CHARACTERIZATION OF MOSES IN DEUTERONOMY 3:12-26.

8. A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms

9. The Amanuensis Hypothesis in New Testament Scholarship: Its Origin, Evidential Basis, and Application.

10. Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

12. Classifying Transactional Addresses using Supervised Learning Approaches over Ethereum Blockchain.

13. Ferrante en Vergilius: Het voordeel van een verborgen auteur.

14. Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric

15. Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks

16. Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones

18. O PSEUDONIMATO COMO PRÁTICA DEMOCRÁTICA PARA A CONSTRUÇÃO DO DISCURSO DE EXTIMIDADE COM CONTEÚDO A FAVOR DA VACINAÇÃO CONTRA A COVID-19.

19. The Alleged 'Letter Allegedly from Us': The Parallel Function of ὡς δι' ἡμῶν in 2 Thessalonians 2.2.

21. Periodical Queries: Early American Magazine Writing in and out of the Charles Brockden Brown Canon.

22. Systems for Digital Self-Sovereignty

27. Privacy Patterns for Pseudonymity

28. Reconsidering the John of Revelation.

29. What's in a (pseudo)name? Ethical conundrums for the principles of anonymisation in social media research.

30. An Obligation of Thanks (2Thess 1,3): Gift and Return in Divine-Human Relationships.

32. mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies

33. A theory of optimum cryptocurrency scope.

34. MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data

35. Iron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites

36. Pseudonymity, authorship, selfhood : the names and lives of Charlotte Brontë and George Eliot

37. RAIAP: renewable authentication on isolated anonymous profiles: A GDPR compliant self-sovereign architecture for distributed systems.

38. Underground testing: Name‐altering practices as probes in electronic music.

43. Improving Air Interface User Privacy in Mobile Telephony

45. Mind Your Social Media Manners: Pseudonymity, Imaginary Audience, and Incivility on Facebook vs. YouTube.

47. What’s holding back blockchain finance? On the possibility of decentralized autonomous finance

50. Pseudonymity

Catalog

Books, media, physical & digital resources