Showing 1 - 20 results of 49 for search '"Pseudonym"', query time: 0.25s Refine Results
  1. 1
    by Yarygina, Tatiana
    Published 2014
    ...The purpose of this research was to explore the phenomenon of a literary pseudonym in different...
    Get full text
  2. 2
    by Hacker, Brittany
    Published 2020
    Subjects: ...Pseudonymous litigation...
    Get full text
  3. 3
    by Li-Cheng Chung, 鍾力程
    Published 2010
    ... with security and private communications, numerous key exchange and pseudonym delivery (KEAPD) approaches have...
    Get full text
    Others
  4. 4
    by Chun-Hao Tseng, 曾俊豪
    Published 2008
    ... and privacy in VANET is quite critical. Pseudonym PKI technology is a practical solution to ensure the above...
    Get full text
    Others
  5. 5
    by Chen, Yu-Jia, 陳昱嘉
    Published 2015
    ..., and packet loss probabilities. In the fourth part, we develop a network coding based pseudonym scheme...
    Get full text
    Others
  6. 6
    by Chao-chung Chen, 陳照中
    Published 2009
    ... systems, such as the pseudonym list with database support, Shamir tag with bit throttling, and spatially...
    Get full text
    Others
  7. 7
    ... (pseudonym) focused more on creativity and imagination in helping his children’s English language acquisition...
    Get full text
  8. 8
    by Tzu-Yu Yang, 楊梓佑
    Published 2017
    ... a pseudonym to achieve anonymity, but the pseudonym is linkable and the scheme is vulnerable...
    Get full text
    Others
  9. 9
    by Ahearn, Catherine Ofelia
    Published 2017
    ... the pseudonym Myles na gCopaleen. The column has often been regarded as a distraction for O’Nolan—one that kept...
    Get full text
  10. 10
    by Penner, Christine
    Published 2011
    ... at Lakeview Middle Years School (pseudonym) had a positive impact on student behaviors....
    Get full text
  11. 11
    by Penner, Christine
    Published 2011
    ... at Lakeview Middle Years School (pseudonym) had a positive impact on student behaviors....
    Get full text
  12. 12
    by Wu, Tongyu
    Published 2018
    ...This project is based on an ethnography of Trifecta Tech (pseudonym) a major high-tech firm...
    Get full text
  13. 13
    by Boyes, Pattie A.
    Published 2007
    ... at Pioneer Faith Community (a pseudonym) started with an informal assessment by the leaders of the faith...
    Get full text
    Others
  14. 14
    by Boyes, Pattie A.
    Published 2007
    ... at Pioneer Faith Community (a pseudonym) started with an informal assessment by the leaders of the faith...
    Get full text
  15. 15
    by Boyes, Pattie A.
    Published 2007
    ... at Pioneer Faith Community (a pseudonym) started with an informal assessment by the leaders of the faith...
    Get full text
  16. 16
    by Jyun-Ruei Li, 李俊叡
    Published 2009
    ... to emit a pseudonym when receiving every reader's query. Therefore, it makes tracking activities...
    Get full text
    Others
  17. 17
    by Dwin Ming Mindy Chou, 周惇敏
    Published 2017
    ... in January 1963 under the pseudonym Victoria Lucas, and became tangled up almost immediately in the drama...
    Get full text
    Others
  18. 18
    by Huang Shih-Yu, 黃士育
    Published 2014
    ...). In addition, there were 24 fifth-grade students in Sunny Primary School (pseudonym) of New Taipei City...
    Get full text
    Others
  19. 19
    by Gorordo, Guadalupe C.
    Published 2010
    ... by parents, the principal, and teachers from Colonia Elementary (pseudonym). According to these four women...
    Get full text
    Get full text
    Others
  20. 20
    by Hsin-Hsiang Huang, 黃信翔
    Published 2011
    ... information through using pseudonym as identifier of node. Both analysis and simula-tion results show...
    Get full text
    Others