-
1
Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change
Published 2015-05-01“…We conduct qualitative study on the performance degradation due to the use of pseudonyms and quantitative analysis on the optimal pseudonym change interval. …”
Get full text
Article -
2
Pseudonym in Classical Kurdish Literature
Published 2018-12-01“…These are the ways of using pseudonym;pseudonyms in terms of morphology; relations of pseudonym with rhyme; the origin of pseudonym; pseudonyms in terms of meaning; having multi-pseudonyms;common pseudonyms.…”
Get full text
Article -
3
-
4
Marcienne MARTIN (2016), A Name to Exist: The Example of the Pseudonym on the Internet
Published 2018-02-01Get full text
Article -
5
SPATA: Strong Pseudonym-Based AuthenTicAtion in Intelligent Transport System
Published 2018-01-01Subjects: Get full text
Article -
6
Le pseudonyme sur le web social : un ethos discursif préalable
Published 2023-06-01Subjects: Get full text
Article -
7
Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles
Published 2019-07-01“…For each vehicle, dynamic pseudonym swap zone allows it dynamically to establish a temporary pseudonym swap zone on demand to exchange the pseudonym with another random vehicle in the just formed zone. …”
Get full text
Article -
8
RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs
Published 2016-03-01“…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. …”
Get full text
Article -
9
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01Subjects: Get full text
Article -
10
-
11
Le pseudonyme chez la communauté d’internautes algériens sur le web social : quels choix et quels enjeux sociolinguistiques ?
Published 2021-12-01Subjects: Get full text
Article -
12
Wyjście z cienia. „Celebrytyzacja” polskiej powieści kryminalnej (i jej autorów) w XXI wieku. Rozpoznanie
Published 2023-12-01Subjects: “…detective novel; militia novel; censorship; literary pseudonym; celebritization…”
Get full text
Article -
13
Fragments d’origine incertaine qui crépitent dans votre tête
Published 2018-04-01Subjects: Get full text
Article -
14
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01“…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
Get full text
Article -
15
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01“…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
Get full text
Article -
16
The Critical Edition Necessity of Fakhri Heravi’s Latayif-Namh [First Translation of Navai’s Majalis-Alnfayis[
Published 2016-01-01“…The study and confrontation of Hekmat’s print and four manuscripts of Majalis-Alnfayis and Latayif-Namh that all are Authentic and Oldest of the Nakhjivani’s manuscript, is necessary Critical Edition Latayif-Namh, because, First, the newfound manuscript is Explained biography about thirty-five poets that not mentioned in the Hekmat’s print to them; Second, is recorded in newfound manuscripts information about some poets and their poetry that not mentioned in the Hekmat’s print to them; Third, there is conflicts and errors in the Hekmat’s print toward newfound manuscripts that mostly to these errors related to poets pseudonym or name, or related to their biography and poetry; Four, there is clearances in text some pages of he Hekmat’s print that mostly these clearances related to poets pseudonym or name, too; Five, there is ambiguities in some phrases means in the Hekmat’s print that is disappear by newfound manuscripts; Six, is not separation the exact boundaries between turkish text translation and translator’s exensions in the Hekmat’s print; Seven, there is not harmony and proportion between two Fakhri’s translation and Qazvini’s translation in the Hekmat’s print.…”
Get full text
Article -
17
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network
Published 2024-11-01“…The scheme incorporates bilinear pairing as one of the authentication mechanisms, designs pseudonym generation algorithms and public-private key pair structures, and introduces a pseudonym verification mechanism. …”
Get full text
Article -
18
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
19
La « co-création » comme dispositif
Published 2016-01-01“…The author examines the functioning of a “co-creative” multimedia platform named Simba (pseudonym) and reveals how, paradoxically, institutionalized forms of co-creation manage to emerge, only to be forever confronted by capitalism’s permanent system of coordination. …”
Get full text
Article -
20
Marcello Drutel (1897-1985) : figure féminine d’une écriture érotique
Published 2021-12-01“…Marcelle Drutel (1897-1985), a provencal poetess of the first half of the 20th century, gave a start to her career as a writer with the publication of a collection of poems, Li Desiranço, published in 1933 with the pseudonym « l’Aubanelenco ». These first love poems contrast with the traditional values of this period, yet they are also part of a literary tradition that began with the poetesses of Antiquity and theTrobairitz. …”
Get full text
Article