Showing 1 - 20 results of 107 for search '"Pseudonym', query time: 0.05s Refine Results
  1. 1

    Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change by Jong-Hyouk Lee, Giwon Lee, Sangheon Pack

    Published 2015-05-01
    “…We conduct qualitative study on the performance degradation due to the use of pseudonyms and quantitative analysis on the optimal pseudonym change interval. …”
    Get full text
    Article
  2. 2

    Pseudonym in Classical Kurdish Literature by Abdurrahman Adak

    Published 2018-12-01
    “…These are the ways of using pseudonym;pseudonyms in terms of morphology; relations of pseudonym with rhyme; the origin of pseudonym; pseudonyms in terms of meaning; having multi-pseudonyms;common pseudonyms.…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles by Min Yang, Yong Feng, Xiaodong Fu, Qian Qian

    Published 2019-07-01
    “…For each vehicle, dynamic pseudonym swap zone allows it dynamically to establish a temporary pseudonym swap zone on demand to exchange the pseudonym with another random vehicle in the just formed zone. …”
    Get full text
    Article
  8. 8

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. …”
    Get full text
    Article
  9. 9
  10. 10

    Piglia/Renzi, postrero desliz by Julio Premat

    Published 2019-02-01
    Subjects:
    Get full text
    Article
  11. 11
  12. 12

    Wyjście z cienia. „Celebrytyzacja” polskiej powieści kryminalnej (i jej autorów) w XXI wieku. Rozpoznanie by Jarosław Klejnocki

    Published 2023-12-01
    Subjects: “…detective novel; militia novel; censorship; literary pseudonym; celebritization…”
    Get full text
    Article
  13. 13
  14. 14

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  15. 15

    Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles by Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG

    Published 2023-06-01
    “…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
    Get full text
    Article
  16. 16

    The Critical Edition Necessity of Fakhri Heravi’s Latayif-Namh [First Translation of Navai’s Majalis-Alnfayis[ by هادی بیدکی

    Published 2016-01-01
    “…The study and confrontation of Hekmat’s print and four manuscripts of Majalis-Alnfayis and Latayif-Namh that all are Authentic and Oldest of the Nakhjivani’s manuscript, is necessary Critical Edition Latayif-Namh, because, First, the newfound manuscript is Explained biography about thirty-five poets that not mentioned in the Hekmat’s print to them; Second, is recorded in newfound manuscripts information about some poets and their poetry that not mentioned in the Hekmat’s print to them; Third, there is conflicts and errors in the Hekmat’s print toward newfound manuscripts that mostly to these errors related to poets pseudonym or name, or related to their biography and poetry; Four, there is clearances in text some pages of he Hekmat’s print that mostly these clearances related to poets pseudonym or name, too; Five, there is ambiguities in some phrases means in the Hekmat’s print that is disappear by newfound manuscripts; Six, is not separation the exact boundaries between turkish text translation and translator’s exensions in the Hekmat’s print; Seven, there is not harmony and proportion between two Fakhri’s translation and Qazvini’s translation in the Hekmat’s print.…”
    Get full text
    Article
  17. 17

    An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network by Changyuan Luo, Duan Li, Muhammad Saad Khan

    Published 2024-11-01
    “…The scheme incorporates bilinear pairing as one of the authentication mechanisms, designs pseudonym generation algorithms and public-private key pair structures, and introduces a pseudonym verification mechanism. …”
    Get full text
    Article
  18. 18

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  19. 19

    La « co-création » comme dispositif by Mehdi Arfaoui

    Published 2016-01-01
    “…The author examines the functioning of a “co-creative” multimedia platform named Simba (pseudonym) and reveals how, paradoxically, institutionalized forms of co-creation manage to emerge, only to be forever confronted by capitalism’s permanent system of coordination. …”
    Get full text
    Article
  20. 20

    Marcello Drutel (1897-1985) : figure féminine d’une écriture érotique by Jean-Yves Casanova, Cécile Noilhan

    Published 2021-12-01
    “…Marcelle Drutel (1897-1985), a provencal poetess of the first half of the 20th century, gave a start to her career as a writer with the publication of a collection of poems, Li Desiranço, published in 1933 with the pseudonym « l’Aubanelenco ». These first love poems contrast with the traditional values of this period, yet they are also part of a literary tradition that began with the poetesses of Antiquity and theTrobairitz. …”
    Get full text
    Article