Showing 41 - 60 results of 65 for search '"Pseudonym"', query time: 0.05s Refine Results
  1. 41

    Piotr Czyżewski’s “Alfurkan tatarski” (Wilno, 1616/1617) and its Authorship by Sergejus Temčinas

    Published 2023-10-01
    “…Since  Matiasz  and Piotr Czyżewski in their publications call themselves brothers and mention each other’s editions, they, contrary to the established tradition, must be con- sidered the actual authors of the respective printed books, and not fictitious pseudonyms.   …”
    Get full text
    Article
  2. 42

    Des prêtres écrivains, la fin des écrivains catholiques (1960-1980) by Frédéric Gugelot

    Published 2019-04-01
    “…Dans les années 1960-1970, paraissent plusieurs romans sacerdotaux, sous pseudonyme, qui dissimulent mal des clercs publiés sans imprimatur, alors que se conjuguent recul des pratiques, chute des vocations et désertion des militants. …”
    Get full text
    Article
  3. 43

    Research on pairing-free certificateless batch anonymous authentication scheme for VANET by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-11-01
    “…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
    Get full text
    Article
  4. 44

    Biography versus Fiction or the Value of Testimony in Jacobs’s and Stowe’s Narratives about Slavery by Anne Garrait-Bourrier

    Published 2004-07-01
    “…Via l’approche d’extraits de textes tirés de l’autobiographie d’Harriet Jacobs Incidents in the Life of A Slave Girl, écrite sous le pseudonyme de Linda Brent et du roman de Harriet Beecher-Stowe Uncle Tom’s Cabin, nous soulignerons le témoignage historique commun qui ressort de ces deux textes. …”
    Get full text
    Article
  5. 45

    Les univers partagés de science-fiction : pour une transauctorialité by Margot Châtelet

    Published 2022-12-01
    “…The concept of transauthoriality thus allows to reinvest the fan-author of an authorial status, from pseudonymity to authorialization. …”
    Get full text
    Article
  6. 46

    “Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations by Wickham Clayton

    Published 2016-07-01
    “…Through an overt intertitle, the film itself implicitly suggests that the events actually happened, listing specific years, current locations, and suggesting pseudonymous protection of the people involved. This comes at the conclusion of a film which contains a number of narratological incoherencies and ideological incongruities, as is typical of exploitation films of the period. …”
    Get full text
    Article
  7. 47

    Regulating DeFi: Safeguarding Market Integrity While Managing High Expectations by Luka Orešković, Ivana Bajakić

    Published 2024-12-01
    “…Since its main characteristics are pseudonymity and a lack of intermediaries, which are currently challenging to systemically evaluate, it requires an equally innovative approach from policy makers, regulators, and legislators. …”
    Get full text
    Article
  8. 48

    La première « Chanson de Migrane » de Lydie Wilson de Ricard publiée à Paris dès 1875 by Rose Blin-Mioch

    Published 2014-12-01
    “…En 1877 a paru dans la première Lauseta, almanach des félibres républicains, sous le pseudonyme de « Dulciorella » un texte intitulé « Migrana », en versions occitane et française. …”
    Get full text
    Article
  9. 49

    Léo Malet ou le roman noir américain made in France by Crystel Pinçonnat

    Published 2022-12-01
    “…To reinforce their credibility, their authors adopted American-sounding pseudonyms. This is how Léo Malet, commissioned by “Minuit,” wrote the first Johnny Metal novel in 1941. …”
    Get full text
    Article
  10. 50

    Ouida: the Fascination of Moral Laxity by Franco Marucci

    Published 2009-03-01
    “…Ouida (pseudonyme de Marie Louise de la Ramée, 1839-1908) quitta Bury St. …”
    Get full text
    Article
  11. 51

    Ad Reinhardt: Rysunki Sprzed Roku 1946 by David RYBAK

    Published 2024-12-01
    “…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
    Get full text
    Article
  12. 52

    Legal Aspects of Telepathology by Christian Dierks

    Published 2000-01-01
    “…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
    Get full text
    Article
  13. 53

    Emily Ussher and The Trail of the Black & Tans by Joanna Wydenbach

    Published 2005-01-01
    “…Cet article étudie les relations historiques et littéraires pendant la guerre anglo-irlandaise à travers la publication de The Trail of the Black and Tans par “The Hurler on the Ditch”, pseudonyme de Emily Usher, propriétaire de Cappagh House dans le Comté de Waterford. …”
    Get full text
    Article
  14. 54

    Association between nutritional status, daily nutrition delivery and clinical outcomes of critically ill adult patients admitted to the intensive care unit: a protocol for Isfahan... by Awat Feizi, Sabrina Schlesinger, Nafiseh Shokri-Mashhadi, Somayeh Rajaii, Milad Nasiri Jounaghani

    Published 2025-01-01
    “…Patient data recorded in the electronic survey will be documented pseudonymously using de-identified patient ID codes, and authorised staff at each participating site will have access to only their identifiable data. …”
    Get full text
    Article
  15. 55

    Dokumenty (wybór Davida Rybaka) / Documents (selected by David Rybak) by David RYBAK

    Published 2024-12-01
    “…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
    Get full text
    Article
  16. 56

    Ad Reinhardt: Les Cartoons avant 1946 by David RYBAK

    Published 2024-12-01
    “…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
    Get full text
    Article
  17. 57

    The Secrets of Salantai Engraving Studio: Stanisław Czerski, the Mysterious Byks, and ‘The Wrong’ Plater by Alma Braziūnienė

    Published 2024-12-01
    “…The objective of this article is to specify some claims on Stanisław Czerski as a promoter of culture and Salantai Engraving Studio while challenging a number of misconceptions that previously were firmly established in historiography, while also providing novel insights in terms of explicating pseudonyms and other relevant issues. The sources of this research are publications in encyclopedias, reference publications and scholarly articles, while also touching upon the relevant archival sources in a number of memory institutions. …”
    Get full text
    Article
  18. 58

    More of the Same? D’Holbach and the Temptation of Self-Quotation by Ruggero Sciuto

    Published 2024-11-01
    “…Politically and philosophically an extremely radical author, d’Holbach took all possible measures to conceal his authorship of his texts, publishing them all either anonymously or pseudonymously. Very few people in the eighteenth century knew about his authorship of his works, and even today the contours of his textual corpus are regrettably indistinct. …”
    Get full text
    Article
  19. 59
  20. 60

    Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook by Abdul Majeed, Safiullah Khan, Seong Oun Hwang

    Published 2022-01-01
    “…The main technical solutions for guaranteeing a user’s privacy are encryption, pseudonymization, anonymization, differential privacy (DP), and obfuscation. …”
    Get full text
    Article