Showing 1 - 20 results of 65 for search '"Pseudonym"', query time: 0.05s Refine Results
  1. 1

    Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change by Jong-Hyouk Lee, Giwon Lee, Sangheon Pack

    Published 2015-05-01
    “…We conduct qualitative study on the performance degradation due to the use of pseudonyms and quantitative analysis on the optimal pseudonym change interval. …”
    Get full text
    Article
  2. 2
  3. 3

    Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles by Min Yang, Yong Feng, Xiaodong Fu, Qian Qian

    Published 2019-07-01
    “…For each vehicle, dynamic pseudonym swap zone allows it dynamically to establish a temporary pseudonym swap zone on demand to exchange the pseudonym with another random vehicle in the just formed zone. …”
    Get full text
    Article
  4. 4

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  8. 8

    Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles by Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG

    Published 2023-06-01
    “…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
    Get full text
    Article
  9. 9

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  10. 10

    Marcello Drutel (1897-1985) : figure féminine d’une écriture érotique by Jean-Yves Casanova, Cécile Noilhan

    Published 2021-12-01
    “…Marcelle Drutel (1897-1985), a provencal poetess of the first half of the 20th century, gave a start to her career as a writer with the publication of a collection of poems, Li Desiranço, published in 1933 with the pseudonym « l’Aubanelenco ». These first love poems contrast with the traditional values of this period, yet they are also part of a literary tradition that began with the poetesses of Antiquity and theTrobairitz. …”
    Get full text
    Article
  11. 11

    « Tuttor ch’eo dirò “gioi” ». La « joie » appellatif de la dame dans la lyrique romane médiévale by Federico Saviotti

    Published 2022-12-01
    “…The analysis of the occurrences in the Troubadours’, Trouveres’ and Italian poets’ corpora allows to formulated an hypothesis about the evolution of his poetic function: from a proper pseudonym to a generic expression whose success is witnessed by its persistence in nowadays common language.…”
    Get full text
    Article
  12. 12

    Secure communication mechanism for VSN based on certificateless signcryption by Wenbo ZHANG, Wenhua HUANG, Jingyu FENG

    Published 2021-07-01
    “…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
    Get full text
    Article
  13. 13

    Research on protection technology for location privacy in VANET by Jian-ming ZHANG, Yu-juan ZHAO, Hao-bin JIANG, Xue-dan JIA, Liang-min WANG

    Published 2012-08-01
    “…Location-based services in VANET solved the problem of road safety,and provided the convenient services to drivers and passengers.But it also brought new problems of privacy protection.The content of privacy protection was analyzed,and put emphasis on two kinds of privacy protection technology based on pseudonyms and signature respectively.Pseudonym-based schemes were classified as special-area based,silence-period,cryptographic mix-zones and mix-zones communication proxy based schemes.Signature-based schemes were also divided into two classes:group-signature and ring-signature.The evaluation methods for privacy protection level were surveyed,in which anonymity set,entropy metric,mathematical analysis theory and formal analysis were discussed and compared.…”
    Get full text
    Article
  14. 14

    Une balle blanche dans un roman noir by Sophie Vallas

    Published 2012-03-01
    “…In 1982 Paul Auster published a roman noir entitled Squeeze Play under the pseudonym of Paul Benjamin. The novel is also a “baseball novel”: its plot essentially deals with a baseball New York team and its former, fallen star, and the final resolution of the mystery intervenes thanks to a revelation brought by a baseball game in which a rather rare and spectacular maneuver (the double suicide squeeze) is used by one of the teams to turn the tables and win the game. …”
    Get full text
    Article
  15. 15

    ‘End of the Goddamned thing!!’ by Richard Williams

    Published 2018-07-01
    “…Differing conventions and fashions for the concluding textual threshold are exemplified from the manuscript evidence (including novels written by Erle Stanley Gardner under the pseudonym A.A. Fair) and from the very extensive dissemination of these best-selling works in book form.…”
    Get full text
    Article
  16. 16

    « Le plus passionnant et le plus original de tous les jeux » : les Treize de Georges Sim, par Détective (1929-1930) by Marie-Astrid Charlier

    Published 2018-12-01
    “…Between March 1929 and June 1930, at the request of his friend Joseph Kessel, Georges Simenon published three series of thirteen short stories in Détective, under the pseudonym Georges Sim. Les Treize Mystères, Les Treize Énigmes and Les Treize Coupables are the subject of a "quiz" which calls the reader to solve each puzzle. …”
    Get full text
    Article
  17. 17

    Escrituras en escena: Teresa de la Parra y el teatro de lo íntimo by Nathalie Bouzaglo

    Published 2024-06-01
    “…It examines the role of the pseudonym in her early career, the iconic role played by Sarah Bernhardt's excentricities as key influences in her writing. …”
    Get full text
    Article
  18. 18

    Dynamics of health and wellness at an African Pentecostal Churchrelated institution in Zimbabwe: by P. Musoni

    Published 2024-12-01
    “… The article explores the challenges faced by God’s Grace University in Zimbabwe (a pseudonym), an African Pentecostal Church-affiliated institution, due to an increase in sexually transmitted infections (STIs) among its students. …”
    Get full text
    Article
  19. 19

    Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system by Haibo ZHANG, Zhou CHEN, Hongwu HUANG, Xiaofan HE

    Published 2022-01-01
    “…Aiming at the problem that vehicles in the vehicular ad-hoc network (VANET) system were vulnerable to malicious attacks when communicating with each other on the public network, a mutual authentication key agreement protocol in the VANET was proposed.A dynamic vehicle group was established by the Chinese remainder theorem to adapt to the rapid changes in the VANET topology.Signature information was used by both parties in communication to quickly authenticate the identity of the message sender, and key agreement was conduct through the semigroup of Chebyshev chaotic mapping.The pseudonym update and private key update mechanism were adopted to protect the privacy and security of the vehicle’s identity.The identities of malicious vehicles were tracked accurately by using signature information, and were revoked quickly by modifying the public key information.In addition, the semantic security of the protocol was proved by the BAN logic model.The simulation results show that the proposed protocol can effectively reduce the communication consumption and significantly reduce the computational consumption compared with the existing similar literature.…”
    Get full text
    Article
  20. 20

    « La souris ne peut pas jouer avec le chat ». Marc Christin, un écrivain à l’asile (Cery, vers 1900) by Marco Cicchini

    Published 2022-05-01
    “…In 1905, Les Évincés, the first book about the Cery asylum, was published in Lausanne under a pseudonym. The account is intended to be a faithful testimony of the experiences of this madhouse in French-speaking Switzerland. …”
    Get full text
    Article