Academic literature on the topic 'Pseudonymat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pseudonymat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Pseudonymat"
Brunet, Manon. "Travestissement littéraire et trajectoire intellectuelle d’Henri-Raymond Casgrain." Dossier 30, no. 1 (January 21, 2005): 47–66. http://dx.doi.org/10.7202/009888ar.
Full textBrunet, Manon. "Anonymat et pseudonymat au XIX siècle : l’envers et l’endroit de pratiques institutionnelles." Voix et Images 14, no. 2 (1989): 168. http://dx.doi.org/10.7202/200767ar.
Full textHardy, Stéphane. "Analyse onomastique des pseudonymes de prostituées parisiennes du XVIIIe au début du XXe siècle." Acta Universitatis Lodziensis. Folia Litteraria Romanica, no. 16 (May 19, 2021): 183–94. http://dx.doi.org/10.18778/1505-9065.16.17.
Full textXin Xin, Tianhan Gao, and Xinyang Deng. "Location privacy protection scheme based on self-organizing cryptographic mix-zone in VANETs." Research Briefs on Information and Communication Technology Evolution 4 (September 15, 2018): 107–13. http://dx.doi.org/10.56801/rebicte.v4i.71.
Full textBALDE, Amadou Woury. "Entre pseudonymat et anonymat dans l'œuvre de Charles Sorel : pratique et pensée de la dissimulation." Écho des études romanes 13, no. 2 (December 11, 2017): 227–37. http://dx.doi.org/10.32725/eer.2017.033.
Full textHébert, Pierre. "L’homme derrière une vitre." Dossier 30, no. 1 (January 21, 2005): 81–92. http://dx.doi.org/10.7202/009890ar.
Full textYang, Min, Yong Feng, Xiaodong Fu, and Qian Qian. "Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865508.
Full textZakharova, Olga. "Fyodor Dostoevsky’s Pseudonyms. Insertion by F. M. Dostoevsky in the Feuilleton by N. N. Strakhov." Неизвестный Достоевский 8, no. 1 (March 2021): 21–41. http://dx.doi.org/10.15393/j10.art.2021.5221.
Full textPallagi, Anna Liza. "Álnevek bűvöletében." Névtani Értesítő 42 (2020): 199–212. http://dx.doi.org/10.29178/nevtert.2020.12.
Full textHong-ying, Zhang. "RUSSIAN PSEUDONYM IN THE BACKGROUND OF CHINESE CULTURE." Humanities And Social Studies In The Far East 18, no. 1 (2021): 97–102. http://dx.doi.org/10.31079/1992-2868-2021-18-1-97-102.
Full textDissertations / Theses on the topic "Pseudonymat"
Luneau, Marie-Pier. "Les Lionel Groulx : la pseudonymie comme stratégie littéraire et jeu institutionnel (1900-1966)." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1996. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21797.pdf.
Full textOmari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music." Universitätsbibliothek Leipzig, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-90542.
Full textMollaret, Damien. "Le détour par l'autre : plurilinguisme et pseudonymie dans les oeuvres de Fernando Pessoa, Vladimir Nabokov, Jorge Luis Borges et Romain Gary." Thesis, Bordeaux 3, 2019. http://www.theses.fr/2019BOR30026.
Full text“I cannot stand my real name, I feel immediately stuck” says the narrator of Pseudo, a Romain Gary novel authored under his pseudonym, Émile Ajar. He adds that he “has attempted everything to run away from [himself]”. He tried specially to learn different languages and even to invent his own. Like Gary other writers have considered their mother tongue or their surname as restraints limiting their possibilities. In order to “feel everything in every way” (Pessoa’s expression) they would change their language or use pseudonyms. To jointly study multilingualism and the use of pseudonyms, we focused on four 20th century authors: the Portuguese poet Fernando Pessoa (1888-1935), the Russian-American novelist Vladimir Nabokov (1899-1977), the Argentinian writer Jorge Luis Borges (1899-1986) and the French novelist Romain Gary (1914-1980). The writings of all four authors are at the intersection of several languages and cultures. In addition to their mother tongue, they each mastered French and English. They used English as a second language for their writing, were translators and/or self-translators. Additionally, all four took pseudonyms and invented fictitious alter egos. Pessoa’s concept of heteronym (closely connected to his multilingualism) allowed us to shed light on the work of the three other authors. To do this, we compared Pessoa’s main heteronyms with those of Bustos Domecq (pseudonym of Borges and Bioy Casares), Emile Ajar (pseudonym of Gary, embodied as the straw man Paul Pavlowitch) and Sirine (Nabokov’s Russian alter ego). Like translation, heteronymous writing requires some depersonalization. And like self-translation, it forces the author to confront an alter ego. To write in another language or to invent a new style in one’s own language, one must renounce a part of one’s self. This thesis aims to show that for these authors using pseudonyms and writing in different languages represents less of a rejection of their identities than an indirect way to come back to themselves. Freed from themselves by their heteronyms, they can better appreciate who they are, be self-critical and thus they can open their hearts to their readers. Writing in a second language also creates a certain distance that enables them to confess and experiment
Lysyanskaya, Anna. "Pseudonym systems." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80544.
Full textBar-Kochva, Sharon. "Les pseudonymes dans les littératures yiddish et hébraïque du milieu du XIXe siècle au milieu du XXe siècle." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCF001.
Full textModern Yiddish and Hebrew literatures are closely connected by a common long history, sharing many stylistic and thematic features. However, both literatures significantly differ in their use of pseudonyms. In Yiddish literature, authors’ pseudonyms appear rather frequently, and a significant number of the most important writers are known mainly in their pseudonyms, while in modern Hebrew literature pen names remained a relatively marginal occurrence. This research analyses pseudonymity in both literatures in order to explain this discrepancy. In the first chapter, the various patterns used in building pseudonyms are analysed, so to establish a general typology of the phenomenon. Subsequently, I focus on the "lasting" pseudonyms, namely those that accompany authors for a long time, shaping and determining their public image. In the second chapter I describe in detail under which circumstances and in what ways the "lasting" pseudonyms were created and used. Finally, in the last part the information analysed previously is utilised, clarifying that pseudonymity is actually a social phenomenon, and defining the social and historical factors that led to the adoption of pseudonymity as one of the "invented traditions" of modern Yiddish literature
Omari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music." Swahili Forum 18 (2011), S. 69-86, 2011. https://ul.qucosa.de/id/qucosa%3A11465.
Full textWilder, Terry L. "New Testament pseudonymity and deception." Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU099071.
Full textYarygina, Tatiana. "Women's Pseudonyms in Russian Modernism." Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18349.
Full textYieh, Pierson. "Vehicle Pseudonym Association Attack Model." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.
Full textBenin, Joseph Thomas. "Unified distribution of pseudonyms in hybrid ephemeral vehicular networks." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45910.
Full textBooks on the topic "Pseudonymat"
Eymer, Wilfrid. Eymers Pseudonymen Lexikon: Realnamen und Pseudonyme in der deutschen Literatur. Bonn: Kirschbaum, 1997.
Find full textRoom, Adrian. A dictionary of pseudonyms and their origins, with stories of name changes. Jefferson, N.C: McFarland, 1989.
Find full textauthor, Savage Diana 1950, ed. Pseudonym. New Kensington, PA: Whitaker House, 2016.
Find full textRoom, Adrian. Dictionary of pseudonyms. 3rd ed. Jefferson, N.C: McFarland, 1998.
Find full textRoom, Adrian. Dictionary of pseudonyms. 3rd ed. Jefferson, N.C: McFarland, 1998.
Find full textRatier, Emmanuel. Encyclopédie des pseudonymes. Paris: Faits & documents, 1993.
Find full textDunaway, Taylor Welford, ed. The Newsprint mask: The tradition of the fictional journalist in America. Ames: Iowa State University Press, 1991.
Find full textOelschlegel, Axel. Das Pseudonym: Roman. Halle: Mitteldt. vlg., 1988.
Find full textOelschlegel, Axel. Das Pseudonym: Roman. Halle: Mitteldeutscher Verlag, 1988.
Find full textHawk, Pat. Hawk's authors' pseudonyms II: A comprehensive reference of modern author's pseudonyms. 2nd ed. [Southlake, TX: P. Hawk], 1995.
Find full textBook chapters on the topic "Pseudonymat"
Fischer-Hübner, Simone. "Pseudonymity." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_1490-3.
Full textFischer-Hübner, Simone. "Pseudonymity." In Encyclopedia of Database Systems, 2207. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1490.
Full textFischer-Hübner, Simone. "Pseudonymity." In Encyclopedia of Database Systems, 2932–33. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1490.
Full textBleumer, Gerrit. "Pseudonyms." In Encyclopedia of Cryptography and Security, 992–94. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_216.
Full textSolanas, Agusti. "Pseudonyms." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1755-1.
Full textSellers, M. N. S. "Republican Pseudonyms." In American Republicanism, 8–10. London: Palgrave Macmillan UK, 1994. http://dx.doi.org/10.1007/978-1-349-13347-5_2.
Full textLysyanskaya, Anna, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. "Pseudonym Systems." In Selected Areas in Cryptography, 184–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46513-8_14.
Full textChen, Lidong. "Access with pseudonyms." In Cryptography: Policy and Algorithms, 232–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0032362.
Full textGabel, Alexander, and Ina Schiering. "Privacy Patterns for Pseudonymity." In Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 155–72. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16744-8_11.
Full textSobirey, Michael. "Grundlagen des pseudonymen Audit." In Datenschutzorientiertes Intrusion Detection, 62–75. Wiesbaden: Vieweg+Teubner Verlag, 1999. http://dx.doi.org/10.1007/978-3-322-86850-3_6.
Full textConference papers on the topic "Pseudonymat"
Zoccoli, Giovanni Gambigliani, Dario Stabili, and Mirco Marchetti. "Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario." In 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall). IEEE, 2023. http://dx.doi.org/10.1109/vtc2023-fall60731.2023.10333561.
Full textDalton, Ben. "Pseudonymity in social machines." In the 22nd International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487788.2488076.
Full textMa, Zhendong, Frank Kargl, and Michael Weber. "Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.455.
Full textSong, Boyeon, and Chris J. Mitchell. "Scalable RFID Pseudonym Protocol." In 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.15.
Full textBorcea-Pfitzmann, Katrin, Elke Franz, and Andreas Pfitzmann. "Usable presentation of secure pseudonyms." In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102486.1102498.
Full textMartucci, Leonardo A., Markulf Kohlweiss, Christer Andersson, and Andriy Panchenko. "Self-certified Sybil-free pseudonyms." In the first ACM conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1352533.1352558.
Full textHan, Seungyeop, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, and David Wetherall. "Expressive privacy control with pseudonyms." In SIGCOMM'13: ACM SIGCOMM 2013 Conference. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2486001.2486032.
Full textPélissier, Samuel, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, and Didier Donsez. "Privacy-Preserving Pseudonyms for LoRaWAN." In WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3643833.3656120.
Full textBenin, Joseph, Michael Nowatkowski, and Henry Owen. "Unified pseudonym distribution in VANETs." In 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2010. http://dx.doi.org/10.1109/wimob.2010.5645015.
Full textDang, Xiaojun, and Yang Zhang. "Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks." In 2008 The Fourth International Conference on Wireless and Mobile Communications. IEEE, 2008. http://dx.doi.org/10.1109/icwmc.2008.19.
Full textReports on the topic "Pseudonymat"
Würth, Stéphanie. SNSF Datastory - Emma – on her way to a professorship? Swiss National Science Foundation, May 2021. http://dx.doi.org/10.46446/datastory.emma-on-her-way-to-a-professorship.
Full textPignataro, C., J. Clarke, and G. Salgueiro. Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS). RFC Editor, April 2012. http://dx.doi.org/10.17487/rfc6593.
Full text