Showing 1 - 20 results of 1,518 for search '"pseudonym"', query time: 0.35s Refine Results
  1. 1
    by Jong-Hyouk Lee, Giwon Lee, Sangheon Pack
    Published 2015-05-01
    ... transportation systems (ITS). In this paper, we introduce the use of pseudonyms in IPv6 ITS communications...
    Get full text
    Article
  2. 2
  3. 3
    by Miranda Mowbray
    Published 2006-03-01
    ...I will give an overview of some technologies that enable pseudonymity - allowing individuals...
    Get full text
    Article
  4. 4
  5. 5
    by Abbott, Reed S.
    Published 2008
    Subjects: ...Closed Pseudonymous Group...
    Get full text
    Get full text
    Others
  6. 6
  7. 7
    by Ahmadreza Yalameha
    Published 2014-07-01
    ...Abstract Mir Mohammad Mom&#39en with Arshi pseudonym and name of Nader ol-Asr was mystic...
    Get full text
    Article
  8. 8
    by Ahmadreza Yalameha
    Published 2014-08-01
    ...Abstract Mir Mohammad Mom'en with Arshi pseudonym and name of Nader ol-Asr was mystic...
    Get full text
    Article
  9. 9
    by M. Stang, Charles
    Published 2012
    Subjects: ...pseudonymity...
    Get fulltext
    eBook
  10. 10
  11. 11
    by Wilder, Terry L.
    Published 1998
    ...This study provides afresh an answer to the question: "If there are pseudonymous letters in the New...
    Get full text
  12. 12
    by Yarygina, Tatiana
    Published 2014
    ...The purpose of this research was to explore the phenomenon of a literary pseudonym in different...
    Get full text
  13. 13
  14. 14
  15. 15
    by Xiaoling Zhu, Yang Lu, Benhong Zhang, Zhengfeng Hou
    Published 2013-04-01
    ... pseudonym schemes, an authority is aware of a vehicle's secret, and its compromise will result...
    Get full text
    Article
  16. 16
    by Marcienne Martin
    Published 2016-02-01
    ... by creating their pseudonymous and by the use of pseudonyms in a relationship without any hierarchy, while...
    Get full text
    Article
  17. 17
    ... be improved by using pseudonyms instead of actual vehicle identities during communication. However, it is also...
    Get full text
    Article
  18. 18
  19. 19
    ..., regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means...
    Get full text
    Article
  20. 20