Suggested Topics within your search.
Suggested Topics within your search.
Diaries, letters & journals
4
Literature: history & criticism
4
Data privacy
2
Literary studies: fiction, novelists & prose writers
2
Literature & literary studies
2
QA75 Electronic computers. Computer science
2
c 1800 to c 1900
2
Accessing data
1
Accommodation
1
Adolescent (MeSH)
1
Ancient history: to c 500 CE
1
Anonymization
1
Biography: general
1
Biography: historical, political & military
1
Blockchain technology
1
Boutique accommodation
1
Ceramic arts, pottery, glass
1
Chitral (Non-MeSH)
1
Christian mysticism
1
Christian theology
1
Complex networks
1
Compliance control
1
Confidential data
1
Counselling & advice services
1
Data security
1
Device application
1
Edge device
1
Elastic stack
1
Employer
1
Enterprise data
1
-
1“... transportation systems (ITS). In this paper, we introduce the use of pseudonyms in IPv6 ITS communications...”
Get full text
Article -
2
-
3by Miranda Mowbray“...I will give an overview of some technologies that enable pseudonymity - allowing individuals...”
Published 2006-03-01
Get full text
Article -
4
-
5by Abbott, Reed S.Subjects: “...Closed Pseudonymous Group...”
Published 2008
Get full text
Get full text
Others -
6
-
7by Ahmadreza Yalameha“...Abstract Mir Mohammad Mom'en with Arshi pseudonym and name of Nader ol-Asr was mystic...”
Published 2014-07-01
Get full text
Article -
8by Ahmadreza Yalameha“...Abstract Mir Mohammad Mom'en with Arshi pseudonym and name of Nader ol-Asr was mystic...”
Published 2014-08-01
Get full text
Article -
9
-
10
-
11by Wilder, Terry L.“...This study provides afresh an answer to the question: "If there are pseudonymous letters in the New...”
Published 1998
Get full text
-
12by Yarygina, Tatiana“...The purpose of this research was to explore the phenomenon of a literary pseudonym in different...”
Published 2014
Get full text
-
13
-
14
-
15“... pseudonym schemes, an authority is aware of a vehicle's secret, and its compromise will result...”
Get full text
Article -
16by Marcienne Martin“... by creating their pseudonymous and by the use of pseudonyms in a relationship without any hierarchy, while...”
Published 2016-02-01
Get full text
Article -
17“... be improved by using pseudonyms instead of actual vehicle identities during communication. However, it is also...”
Get full text
Article -
18by CHEN Hong, CHEN Honglin, HUANG Jie, XIAO Chenglong, GUO Pengfei, JIN HaiboSubjects: “...pseudonymous signature...”
Published 2020-08-01
Get full text
Article -
19“..., regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means...”
Get full text
Article -
20