Showing 21 - 40 results of 65 for search '"Pseudonym"', query time: 0.04s Refine Results
  1. 21

    En chair et en os ? Sens, sensations et sensationnalisme dans Desperate Remedies (1871) de Thomas Hardy by Laurence Talairach-Vielmas

    Published 2007-03-01
    “…Desperate Remedies, Thomas Hardy’s first novel, published under a pseudonym, is often regarded as a sensation novel. …”
    Get full text
    Article
  2. 22

    Dynamic Mix-zone scheme with joint-entropy based metric for privacy-perserving in IoV by Xia FENG, Yawei LIU

    Published 2018-03-01
    “…Aiming at the weak flexibility and lack of users’ transparency existing in the current Mix-zone schemes for Internet of vehicle (IoV),a dynamic was proposed for Mix-zone construction with traffic adaption,which could construct a Mix-zone for the vehicles dynamically according to the traffic conditions for changing pseudonym at anytime and anywhere.This kind of Mix-zone could achieve privacy-preserving based on the identity and location.In addition,a novel traffic-adaptive metric was presented for classifying the privacy leveled in Mix-zone,which applied the normalization quantitation to measure the degree of Mix-zone’s privacy demanding by the current region.It was verified that the joint entropy-based privacy measuring model and the Mix-zone construction scheme by utilizing the trajectory data of taxis in certain district in Shenzhen city.The experimental shows that the proposed combination entropy-based model could depict the proportional relationship between the traffic scene parameters and the privacy-preserving degrees.The scheme is better in performance over the related methods,and strikes a good balance between location privacy and service usability.…”
    Get full text
    Article
  3. 23

    Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks by LIU Jie, FAN Xinyue, HE Jiahui

    Published 2024-09-01
    “…Conditional privacy protection was provided by a pseudonym mechanism, ensuring the anonymity of legitimate vehicles and the traceability and revocation of malicious vehicles. …”
    Get full text
    Article
  4. 24

    Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture by Yingjie XIA, Siyu ZHU, Xuejiao LIU

    Published 2023-04-01
    “…In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was proposed.A novel block structure BM-Tree was designed for vehicle platoon identity authentication, which provided support for efficient cross trust-domain group authentication by sharing the group authentication parame-ters on the blockchain.Dynamic pseudonym was used for vehicle identity privacy-preserving and bilinear mapping was used to transform the trust-domain parameters, which realized cross trust-domain group authentication with conditional privacy.An efficient group authentication protocol based on BM-Tree was proposed, which realized batch identity au-thentication and re-authentication of vehicle platoon.The proposed scheme has better performance than existing cross trust-domain authentication methods in terms of security and computational overhead.Experimental result shows that the authentication delay is reduced by 29%, 25% and 53% on average, respectively compared with BLA, MDPA and BBA.…”
    Get full text
    Article
  5. 25

    Washington Irving, The Sketch Book of Geoffrey Crayon, Gent. : le Moyen Âge aux origines by Delphine Louis-Dimitrov

    Published 2016-01-01
    “…Indeed the narrator’s pseudonym, Geoffrey Crayon, hints at an implicit claim of lineage with Geoffrey Chaucer, whose presence frames The Sketch Book. …”
    Get full text
    Article
  6. 26

    The Textual Criticism and Structural Analysis of Noorbakhshi’s Adab-e- Insha in the Rhetoric of Prose and the Epistolary of the Safavid Era by amir jahadi

    Published 2019-02-01
    “…Norbakhshi is the poet of the Safavid era and his pseudonym has been Sayyed. At the beginning of the text, the characteristics of the secretaries of the court are enumerated. …”
    Get full text
    Article
  7. 27

    Léon Cordes écrivain et paysan. L’expérience du Paysan du Midi (fin des années 1940 - début des années 1950) : un billet d’humeur en occitan dans la presse agricole en français... by Philippe Gardy

    Published 2023-12-01
    “…Not surprisingly, in the early 1950s, he became involved with the new trade publication Le Paysan du Midi, founded and directed by Philippe Lamour (1903-1992), the father, among others, of that emblematic land development project, the Compagnie du Bas-Rhône. In 1952, under a pseudonym, he published a weekly humor column in Occitan, Sul pic de Miegjorn (Sur le coup de Midi), in Le Paysan du Midi, in which he commented on current events in vineyards, wine and much more, in a serious tone that was nonetheless full of critical verve. …”
    Get full text
    Article
  8. 28

    Landschaftsgedächtnis und Geschlechterdiskurse in ausgewählten Werken von Elsa Bernstein und Maria Waser by Monika Mańczyk-Krygiel

    Published 2024-12-01
    “…Symbolic drama by Elsa Bernstein (pseudonym Ernst Rosmer, 1866–1949) Mutter Maria Totengedicht in fünf Wandlungen (1900) deals with the subject of the supplanting of old folk beliefs by the Christian religion, as well as the violent clash of the male and female worlds, symbolized here by the figures of alpine mythology as literary topoi (hunter and mountain goddess). …”
    Get full text
    Article
  9. 29

    Enake’s Dairy Shop or About Lactobacillus Bulgaricus in Romanian Avant-Garde by Malamir Spasov

    Published 2025-01-01
    “…While working in his father Yanaki (Enake)’s Dairy shop, young Georgi began to write avant-garde poetry under the pseudonym Stephan Roll. Gradually, their dairy shop became a regular meeting place for a large number of young Romanian avant-garde artists in interwar Bucharest and one of the most original literary circles in Romania. …”
    Get full text
    Article
  10. 30

    An Attempt to Account for Distributed Cognition in Translating the Poetry of Juhan Viiding by Miriam McIlfatrick-Ksenofontov

    Published 2023-08-01
    “…It is preparatory work for translating the poetry of one of Estonia’s most widely read and appreciated poets, Juhan Viiding (1948–1995), who wrote under the pseudonym Jüri Üdi until 1978. It proposes that an understanding of Viiding’s work is enhanced when viewed in the wider human perspective of distributed cognition, as elaborated by neuroanthropologist Merlin Donald. …”
    Get full text
    Article
  11. 31

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  12. 32

    STUDENTS' PERCEPTIONS AND MOTIVATION TOWARD E-LEARNING AT AKM HIGH SCHOOL DURING THE COVID-19 PANDEMIC by Nur Fitria Anggrisia, M. Fadel Ihza Islami

    Published 2024-12-01
    “…This study explores the perceptions and motivations of eleventh-grade students at AKM High School (pseudonym) toward e-learning in their English classes during the 2020/2021 academic year. …”
    Get full text
    Article
  13. 33

    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks by Mei Sun, Yuyan Guo, Dongbing Zhang, MingMing Jiang

    Published 2021-01-01
    “…In this study, an anonymous authentication and key negotiation scheme by using private key and group key is proposed, which is based on pseudonym using the nonsingular elliptic curve. In this scheme, there is no third party trust center to participate in the authentication, there is no need to query the database, and there is no need of the local database to save the identity information of many vehicles, which reduce the storage space and the authentication time compared with other schemes. …”
    Get full text
    Article
  14. 34

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article
  15. 35

    NGUYEN DU’S PERCEPTION ABOUT CHINA UNDER THE QING DYNASTY THROUGH BAC HANH TAP LUC by Lê Quang Trường

    Published 2021-04-01
    “…Nguyen Du (1765-1820), with courtesy name To Nhu, poetic name Thanh Hien, and other pseudonym Hong Son Liep Ho, was born into the noble Nguyen clan of Tien Dien village in central Vietnam. …”
    Get full text
    Article
  16. 36

    Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks by Sujash Naskar, Gerhard Hancke, Tingting Zhang, Mikael Gidlund

    Published 2025-01-01
    “…By leveraging lightweight cryptographic mechanisms such as hash functions, quadratic residuosity, and Legendre symbols, the proposed scheme ensures secure authentication, group key sharing, and pseudonym management within IoV networks. The proposed scheme’s security and privacy features, along with its correctness, have been rigorously validated against various security threats where other state-of-the-art schemes fail. …”
    Get full text
    Article
  17. 37

    L’anxiété technocratique en France : les romans du Fleuve Noir « Anticipation », 1951-1960 by Bradford Lyau

    Published 2019-06-01
    “…Inspired by Saint-Simon and under the pseudonym of F. Richard-Bessière, François Richard and Henri Bessières represent the technocratic order as an ideal paradigm. …”
    Get full text
    Article
  18. 38

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. …”
    Get full text
    Article
  19. 39

    Organiser le soutien aux mobilisations de 2022-2023 en Iran. Lectures intersectionnelles et internationales by Lucia Direnberger, Sahar Aurore Saeidnia

    Published 2023-05-01
    “…Shirin and Gashin (pseudonyms) are Kurdish feminist researchers and activists in Paris. …”
    Get full text
    Article
  20. 40

    Identitas Komunikasi Penggemar K-Pop di Media Sosial X by Alsa Aisiyah Sutardi, Yoka Pradana, Rah Utami Nugrahani

    Published 2024-12-01
    “…Mereka cenderung menggunakan identitas yang menggabungkan identitas asli dengan identitas sebagai penggemar K-pop (pseudonymity). Penelitian ini bertujuan menganalisis proses pembentukan identitas pseudonymity penggemar K-pop di media sosial X dengan menggunakan teori identitas komunikasi. …”
    Get full text
    Article