-
41
Piotr Czyżewski’s “Alfurkan tatarski” (Wilno, 1616/1617) and its Authorship
Published 2023-10-01“…Since Matiasz and Piotr Czyżewski in their publications call themselves brothers and mention each other’s editions, they, contrary to the established tradition, must be con- sidered the actual authors of the respective printed books, and not fictitious pseudonyms. …”
Get full text
Article -
42
Des prêtres écrivains, la fin des écrivains catholiques (1960-1980)
Published 2019-04-01“…Dans les années 1960-1970, paraissent plusieurs romans sacerdotaux, sous pseudonyme, qui dissimulent mal des clercs publiés sans imprimatur, alors que se conjuguent recul des pratiques, chute des vocations et désertion des militants. …”
Get full text
Article -
43
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01“…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
Get full text
Article -
44
Biography versus Fiction or the Value of Testimony in Jacobs’s and Stowe’s Narratives about Slavery
Published 2004-07-01“…Via l’approche d’extraits de textes tirés de l’autobiographie d’Harriet Jacobs Incidents in the Life of A Slave Girl, écrite sous le pseudonyme de Linda Brent et du roman de Harriet Beecher-Stowe Uncle Tom’s Cabin, nous soulignerons le témoignage historique commun qui ressort de ces deux textes. …”
Get full text
Article -
45
Les univers partagés de science-fiction : pour une transauctorialité
Published 2022-12-01“…The concept of transauthoriality thus allows to reinvest the fan-author of an authorial status, from pseudonymity to authorialization. …”
Get full text
Article -
46
“Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations
Published 2016-07-01“…Through an overt intertitle, the film itself implicitly suggests that the events actually happened, listing specific years, current locations, and suggesting pseudonymous protection of the people involved. This comes at the conclusion of a film which contains a number of narratological incoherencies and ideological incongruities, as is typical of exploitation films of the period. …”
Get full text
Article -
47
Regulating DeFi: Safeguarding Market Integrity While Managing High Expectations
Published 2024-12-01“…Since its main characteristics are pseudonymity and a lack of intermediaries, which are currently challenging to systemically evaluate, it requires an equally innovative approach from policy makers, regulators, and legislators. …”
Get full text
Article -
48
La première « Chanson de Migrane » de Lydie Wilson de Ricard publiée à Paris dès 1875
Published 2014-12-01“…En 1877 a paru dans la première Lauseta, almanach des félibres républicains, sous le pseudonyme de « Dulciorella » un texte intitulé « Migrana », en versions occitane et française. …”
Get full text
Article -
49
Léo Malet ou le roman noir américain made in France
Published 2022-12-01“…To reinforce their credibility, their authors adopted American-sounding pseudonyms. This is how Léo Malet, commissioned by “Minuit,” wrote the first Johnny Metal novel in 1941. …”
Get full text
Article -
50
Ouida: the Fascination of Moral Laxity
Published 2009-03-01“…Ouida (pseudonyme de Marie Louise de la Ramée, 1839-1908) quitta Bury St. …”
Get full text
Article -
51
Ad Reinhardt: Rysunki Sprzed Roku 1946
Published 2024-12-01“…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
Get full text
Article -
52
Legal Aspects of Telepathology
Published 2000-01-01“…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
Get full text
Article -
53
Emily Ussher and The Trail of the Black & Tans
Published 2005-01-01“…Cet article étudie les relations historiques et littéraires pendant la guerre anglo-irlandaise à travers la publication de The Trail of the Black and Tans par “The Hurler on the Ditch”, pseudonyme de Emily Usher, propriétaire de Cappagh House dans le Comté de Waterford. …”
Get full text
Article -
54
Association between nutritional status, daily nutrition delivery and clinical outcomes of critically ill adult patients admitted to the intensive care unit: a protocol for Isfahan...
Published 2025-01-01“…Patient data recorded in the electronic survey will be documented pseudonymously using de-identified patient ID codes, and authorised staff at each participating site will have access to only their identifiable data. …”
Get full text
Article -
55
Dokumenty (wybór Davida Rybaka) / Documents (selected by David Rybak)
Published 2024-12-01“…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
Get full text
Article -
56
Ad Reinhardt: Les Cartoons avant 1946
Published 2024-12-01“…While he continued his studies and began to paint, he published numerous drawings there, most of them under pseudonyms. Apart from shedding some more light on Reinhardt, these drawings remain valuable documents of service to the analysis and comprehension of American Marxist thought during the thirties and forties. …”
Get full text
Article -
57
The Secrets of Salantai Engraving Studio: Stanisław Czerski, the Mysterious Byks, and ‘The Wrong’ Plater
Published 2024-12-01“…The objective of this article is to specify some claims on Stanisław Czerski as a promoter of culture and Salantai Engraving Studio while challenging a number of misconceptions that previously were firmly established in historiography, while also providing novel insights in terms of explicating pseudonyms and other relevant issues. The sources of this research are publications in encyclopedias, reference publications and scholarly articles, while also touching upon the relevant archival sources in a number of memory institutions. …”
Get full text
Article -
58
More of the Same? D’Holbach and the Temptation of Self-Quotation
Published 2024-11-01“…Politically and philosophically an extremely radical author, d’Holbach took all possible measures to conceal his authorship of his texts, publishing them all either anonymously or pseudonymously. Very few people in the eighteenth century knew about his authorship of his works, and even today the contours of his textual corpus are regrettably indistinct. …”
Get full text
Article -
59
RNA editing-based biomarker blood test for the diagnosis of bipolar disorder: protocol of the EDIT-B study
Published 2025-02-01“…Participants’ data will be pseudonymized at the research sites. Any publication will use fully anonymized data. …”
Get full text
Article -
60
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01“…The main technical solutions for guaranteeing a user’s privacy are encryption, pseudonymization, anonymization, differential privacy (DP), and obfuscation. …”
Get full text
Article