Showing 1 - 20 results of 926 for search '"Pseudonym"', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3
    by Abbott, Reed S.
    Published 2008
    Subjects: ...Closed Pseudonymous Group...
    Get full text
    Get full text
    Others
  4. 4
    by Wilder, Terry L.
    Published 1998
    ...This study provides afresh an answer to the question: "If there are pseudonymous letters in the New...
    Get full text
  5. 5
    by Yarygina, Tatiana
    Published 2014
    ...The purpose of this research was to explore the phenomenon of a literary pseudonym in different...
    Get full text
  6. 6
  7. 7
  8. 8
    by Hacker, Brittany
    Published 2020
    Subjects: ...Pseudonymous litigation...
    Get full text
  9. 9
  10. 10
  11. 11
    ... information used to evaluate the reputation of users is dynamic andassociated to their pseudonyms...
    Get full text
    Others
  12. 12
  13. 13
  14. 14
    by Messing, Andreas
    Published 2018
    ...Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order...
    Get full text
    Others
  15. 15
  16. 16
  17. 17
    by Xu, Yijia
    Published 2012
    .... Earlier on the Internet, pseudonym was invented to identify users. As social networks came into play...
    Get full text
    Others
  18. 18
    by Tang, Fugui
    Published 2012
    ... of traditional online identities, in forms of pseudonyms, is the privacy protection of online users. Users can...
    Get full text
    Others
  19. 19
    by Ernstzen, Cedrine Veanca
    Published 2021
    .... These controls preserve Namibia's foreign reserves which can theoretically be under threat by pseudonymous cross...
    Get full text
    Dissertation
  20. 20
    by Li-Cheng Chung, 鍾力程
    Published 2010
    ... with security and private communications, numerous key exchange and pseudonym delivery (KEAPD) approaches have...
    Get full text
    Others