-
1“... transportation systems (ITS). In this paper, we introduce the use of pseudonyms in IPv6 ITS communications...”
Get full text
Article -
2by Miranda Mowbray“...I will give an overview of some technologies that enable pseudonymity - allowing individuals...”
Published 2006-03-01
Get full text
Article -
3
-
4by Ahmadreza Yalameha“...Abstract Mir Mohammad Mom'en with Arshi pseudonym and name of Nader ol-Asr was mystic...”
Published 2014-07-01
Get full text
Article -
5by Ahmadreza Yalameha“...Abstract Mir Mohammad Mom'en with Arshi pseudonym and name of Nader ol-Asr was mystic...”
Published 2014-08-01
Get full text
Article -
6
-
7
-
8“... pseudonym schemes, an authority is aware of a vehicle's secret, and its compromise will result...”
Get full text
Article -
9by Marcienne Martin“... by creating their pseudonymous and by the use of pseudonyms in a relationship without any hierarchy, while...”
Published 2016-02-01
Get full text
Article -
10“... be improved by using pseudonyms instead of actual vehicle identities during communication. However, it is also...”
Get full text
Article -
11by CHEN Hong, CHEN Honglin, HUANG Jie, XIAO Chenglong, GUO Pengfei, JIN HaiboSubjects: “...pseudonymous signature...”
Published 2020-08-01
Get full text
Article -
12“..., regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means...”
Get full text
Article -
13
-
14by Hrebnieva H.Subjects: “..., western european authors of the 19th century, pseudonym, anonym, phrenonym, andronym....”
Published 2020-01-01
Get full text
Article -
15
-
16by Emily van der Nagel“..., people deliberately remain pseudonymous on TributeMe. This is a strategy to compartmentalize...”
Published 2020-02-01
Get full text
Article -
17
-
18
-
19
-
20