To see the other types of publications on this topic, follow the link: Pseudonymat.

Dissertations / Theses on the topic 'Pseudonymat'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Pseudonymat.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Luneau, Marie-Pier. "Les Lionel Groulx : la pseudonymie comme stratégie littéraire et jeu institutionnel (1900-1966)." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1996. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21797.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Omari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music." Universitätsbibliothek Leipzig, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-90542.

Full text
Abstract:
Over the last two decades Bongo Fleva music has become a popular form of entertainment as well as a key cultural element among Tanzanian urban youth. The objective of this paper is to examine the role of pseudonyms in this musical genre in Tanzania. It focuses on how Bongo Fleva artists adopt their pseudonyms and discusses their role in identity formation among urban youths in contemporary Tanzania. The paper argues that pseudonyms in Bongo Fleva, as in various other fields, have an important role to play in portraying one’s identity, culture, characteristics, profile, actions, hope and imagination.
APA, Harvard, Vancouver, ISO, and other styles
3

Mollaret, Damien. "Le détour par l'autre : plurilinguisme et pseudonymie dans les oeuvres de Fernando Pessoa, Vladimir Nabokov, Jorge Luis Borges et Romain Gary." Thesis, Bordeaux 3, 2019. http://www.theses.fr/2019BOR30026.

Full text
Abstract:
« Je ne peux pas supporter mon vrai nom, je me sens aussitôt coincé » affirme le narrateur de Pseudo, roman que Romain Gary a signé de son pseudonyme Émile Ajar. Il ajoute qu’il a « tout essayé pour [se] fuir » et en particulier tenté d’apprendre des langues très éloignées de la sienne, voire d’inventer sa propre langue. Comme Gary, certains écrivains ont considéré leur langue maternelle ou leur patronyme comme des carcans limitant leurs possibilités. Pour tenter de « tout sentir, de toutes les manières » (expression de Pessoa) ils ont pu changer de langue ou prendre des pseudonymes. Afin d’étudier conjointement le plurilinguisme et la pseudonymie, nous avons choisi un corpus de quatre auteurs du XXe siècle : le poète portugais Fernando Pessoa (1888-1935), le romancier russo-américain Vladimir Nabokov (1899-1977), l’écrivain argentin Jorge Luis Borges (1899-1986) et le romancier français Romain Gary (1914-1980). Tous les quatre se situent au carrefour de plusieurs langues et cultures. Maîtrisant le français et l’anglais en plus de leur langue maternelle, ils ont utilisé l’anglais comme deuxième langue d’écriture et ont pratiqué la traduction et/ou l’autotraduction. De plus, ils ont tous pris des pseudonymes et se sont inventé des doubles d’écrivains fictifs. Le concept pessoen d’hétéronyme (très lié à son plurilinguisme) nous a permis d’éclairer les pratiques des trois autres auteurs. Pour cela, nous avons comparé les principaux hétéronymes de Pessoa avec Bustos Domecq (pseudonyme commun à Borges et à Bioy Casares), Émile Ajar (pseudonyme de Gary, incarné par un homme de paille, Paul Pavlowitch) et Sirine (le double russe de Nabokov). Comme la traduction, l’écriture hétéronymique nécessite une certaine dépersonnalisation. Et comme l’autotraduction, elle oblige un auteur à se confronter à un alter ego. Pour écrire dans une autre langue ou inventer un style nouveau dans la sienne, il faut renoncer à une certaine maîtrise et à une part de soi. L’hypothèse de notre travail est que les changements de langues et/ou de noms effectués par ces auteurs constituent finalement moins un rejet de leur identité qu’une façon détournée de faire route vers soi. En les libérant d’eux-mêmes, les hétéronymes leur ont permis de s’observer avec plus de recul, de commenter leur propre œuvre comme si c’était celle d’un autre et de se confier davantage. Il en va de même pour l’écriture dans une langue seconde qui crée, elle aussi, une certaine distance propice aux confessions et aux expérimentations
“I cannot stand my real name, I feel immediately stuck” says the narrator of Pseudo, a Romain Gary novel authored under his pseudonym, Émile Ajar. He adds that he “has attempted everything to run away from [himself]”. He tried specially to learn different languages and even to invent his own. Like Gary other writers have considered their mother tongue or their surname as restraints limiting their possibilities. In order to “feel everything in every way” (Pessoa’s expression) they would change their language or use pseudonyms. To jointly study multilingualism and the use of pseudonyms, we focused on four 20th century authors: the Portuguese poet Fernando Pessoa (1888-1935), the Russian-American novelist Vladimir Nabokov (1899-1977), the Argentinian writer Jorge Luis Borges (1899-1986) and the French novelist Romain Gary (1914-1980). The writings of all four authors are at the intersection of several languages and cultures. In addition to their mother tongue, they each mastered French and English. They used English as a second language for their writing, were translators and/or self-translators. Additionally, all four took pseudonyms and invented fictitious alter egos. Pessoa’s concept of heteronym (closely connected to his multilingualism) allowed us to shed light on the work of the three other authors. To do this, we compared Pessoa’s main heteronyms with those of Bustos Domecq (pseudonym of Borges and Bioy Casares), Emile Ajar (pseudonym of Gary, embodied as the straw man Paul Pavlowitch) and Sirine (Nabokov’s Russian alter ego). Like translation, heteronymous writing requires some depersonalization. And like self-translation, it forces the author to confront an alter ego. To write in another language or to invent a new style in one’s own language, one must renounce a part of one’s self. This thesis aims to show that for these authors using pseudonyms and writing in different languages represents less of a rejection of their identities than an indirect way to come back to themselves. Freed from themselves by their heteronyms, they can better appreciate who they are, be self-critical and thus they can open their hearts to their readers. Writing in a second language also creates a certain distance that enables them to confess and experiment
APA, Harvard, Vancouver, ISO, and other styles
4

Lysyanskaya, Anna. "Pseudonym systems." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bar-Kochva, Sharon. "Les pseudonymes dans les littératures yiddish et hébraïque du milieu du XIXe siècle au milieu du XXe siècle." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCF001.

Full text
Abstract:
Les littératures yiddish et hébraïque modernes sont étroitement liées par une histoire commune et partagent également de multiples traits stylistiques et thématiques. Or, une différence importante peut être remarquée quant à l’usage des pseudonymes dans les deux langues. Dans la littérature yiddish moderne, la pseudonymie est très importante, aussi bien du point de vue quantitatif que qualitatif, et une grande partie des plus importants auteurs yiddish sont connus principalement sous leur pseudonyme, alors que dans la littérature hébraïque moderne les noms de plume restent un phénomène relativement marginal. La présente recherche analyse la pseudonymie dans les deux littératures, dans le but d’expliquer cet écart. Nous commençons par une analyse des modes de construction des pseudonymes pour en constituer une typologie générale. Par la suite, nous nous concentrons sur les pseudonymes « durables », c'est-à-dire ceux qui accompagnent les auteurs sur le long terme et façonnent leur image publique, pour décrire en détail dans quelles circonstances et de quelles manières ils sont utilisés. Enfin, nous utilisons les informations recueillies pour démontrer que la pseudonymie est un phénomène social, et pour isoler les facteurs sociaux et historiques qui ont conduit à l’adoption de la pseudonymie comme l’une des « traditions inventées » de la littérature yiddish moderne
Modern Yiddish and Hebrew literatures are closely connected by a common long history, sharing many stylistic and thematic features. However, both literatures significantly differ in their use of pseudonyms. In Yiddish literature, authors’ pseudonyms appear rather frequently, and a significant number of the most important writers are known mainly in their pseudonyms, while in modern Hebrew literature pen names remained a relatively marginal occurrence. This research analyses pseudonymity in both literatures in order to explain this discrepancy. In the first chapter, the various patterns used in building pseudonyms are analysed, so to establish a general typology of the phenomenon. Subsequently, I focus on the "lasting" pseudonyms, namely those that accompany authors for a long time, shaping and determining their public image. In the second chapter I describe in detail under which circumstances and in what ways the "lasting" pseudonyms were created and used. Finally, in the last part the information analysed previously is utilised, clarifying that pseudonymity is actually a social phenomenon, and defining the social and historical factors that led to the adoption of pseudonymity as one of the "invented traditions" of modern Yiddish literature
APA, Harvard, Vancouver, ISO, and other styles
6

Omari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music." Swahili Forum 18 (2011), S. 69-86, 2011. https://ul.qucosa.de/id/qucosa%3A11465.

Full text
Abstract:
Over the last two decades Bongo Fleva music has become a popular form of entertainment as well as a key cultural element among Tanzanian urban youth. The objective of this paper is to examine the role of pseudonyms in this musical genre in Tanzania. It focuses on how Bongo Fleva artists adopt their pseudonyms and discusses their role in identity formation among urban youths in contemporary Tanzania. The paper argues that pseudonyms in Bongo Fleva, as in various other fields, have an important role to play in portraying one’s identity, culture, characteristics, profile, actions, hope and imagination.
APA, Harvard, Vancouver, ISO, and other styles
7

Wilder, Terry L. "New Testament pseudonymity and deception." Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU099071.

Full text
Abstract:
This study provides afresh an answer to the question: "If there are pseudonymous letters in the New Testament, what can be said about their intention and reception?" A survey of scholarship shows the need for the present inquiry. Five primary areas are investigated. First, an examination of various Greco-Roman and Christian texts reveals that sometimes in antiquity pseudonymous documents were written with no intention to deceive (e.g. some of the Pythagorean literature). However, not every writing in antiquity was written in the same spirit. For, it is then shown that many writers in Greco-Roman antiquity, including early Christians, had scruples regarding literary property and pseudonymity. Second, a comparison of some Greco-Roman pseudepigraphal epistles with the disputed Pauline letters reveals that non-deceptive pseudonymity is possible for the latter works, if pseudonymous, in the light of the analogy of many of the former writings. Thus, contrary to the views of some scholars, a historical and analogous precedent exists for non-deceptive pseudo-Pauline letters, if present in the NT. Third, a study of the available documentary evidence indicates that the early Church (second-century onwards) generally did not accept apostolic pseudepigrapha, and suggests that it regarded such writings as deceptive. These responses to apostolic pseudepigrapha act as a background against which some of the alleged NT pseudepigrapha are later evaluated. Fourth, an examination of the early Church's understanding of apostolic authority shows the uniqueness of the apostolic office in the first and second centuries. This evidence is marshalled against the assumption that a discontinuity of attributes towards pseudepigrapha exists between the first and second-century Churches. It is suggested that apostolic authority may have provided the impetus to write under the names of the apostles, but that this practice was not acceptable. Finally, it is suggested that the use of the pseudonym may have been less appropriate in letters than in other genres.
APA, Harvard, Vancouver, ISO, and other styles
8

Yarygina, Tatiana. "Women's Pseudonyms in Russian Modernism." Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18349.

Full text
Abstract:
The purpose of this research was to explore the phenomenon of a literary pseudonym in different countries with the main focus on Russia at the end of the 19th and the beginning of the 20th centuries. This thesis also discussed in depth the pseudonyms taken by Russian female writers of the Silver Age, the reasons for having the pseudonyms, and how their pseudonyms affected their lives and literary careers. This study highlighted the three examples of pseudonym-creation during the said period: it demonstrated the cases of Elizaveta Dmitrieva (the pseudonym "Cherubina de Gabriak"), Zinaida Gippius (the pseudonym "Anton Krainii"), and Anna Gorenko (the pseudonym "Akhmatova"). The results showed that each pseudonym manifested itself in the works of each writer as well as in their personal and professional lives in quite different ways and that both the pseudonym and the real name played a significant role in the creative activity of the three female writers.
APA, Harvard, Vancouver, ISO, and other styles
9

Yieh, Pierson. "Vehicle Pseudonym Association Attack Model." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.

Full text
Abstract:
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution of this paper is a new attack model that uses long-distance pseudonym changing and short-distance non-changing protocols to associate vehicles with their respective pseudonyms.
APA, Harvard, Vancouver, ISO, and other styles
10

Benin, Joseph Thomas. "Unified distribution of pseudonyms in hybrid ephemeral vehicular networks." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45910.

Full text
Abstract:
This research devises a unified method for the distribution of pseudonyms in hybrid ephemeral vehicular networks (VNs), which are often referred to as vehicular ad hoc networks (VANETs), for the purposes of refill, intra-regional, and inter-regional movement. This work addresses a significant impediment to the use of pseudonyms, which has been almost universally accepted (and is on the verge of being standardized by the Institute for Electrical and Electronic Engineers (IEEE) and the Society for Automotive Engineers (SAE) as the best means to balance attribution and privacy to maximize the value of infrastructure deployment and citizen acceptability (i.e. use). The results include a pseudonym distribution protocol that maximizes ease of use while not compromising the security or privacy pseudonyms afford. These results contribute to the solution, in a scalable, adaptive, and bandwidth efficient manner, one of the remaining impediments to the adoption of VANETs. The new method shows improved performance compared to a baseline pseudonym distribution method that does not take these factors into consideration.
APA, Harvard, Vancouver, ISO, and other styles
11

Robertson, Malcolm J. "The authorship of 1 Peter pseudonym or apostolic witness /." Theological Research Exchange Network (TREN), 1988. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Schmidt, Jochen. "Vielstimmige Rede vom Unsagbaren Dekonstruktion, Glaube und Kierkegaards pseudonyme Literatur." Berlin New York de Gruyter, 2005. http://deposit.ddb.de/cgi-bin/dokserv?id=2704206&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Schmidt, Jochen. "Vielstimmige Rede vom Unsagbaren Dekonstruktion, Glaube und Kierkegaards pseudonyme Literatur /." Berlin : De Gruyter, 2006. http://site.ebrary.com/lib/librarytitles/Doc?id=10154755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Messing, Andreas. "A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184.

Full text
Abstract:
Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. Therefore, the vehicles acquire a set of pseudonyms from the VPKI, i.e. infrastructure of the communication system, and switches pseudonym frequently. If a vehicle would be unable to acquire these pseudonyms, it would not be able to utilize the communication system without compromising its privacy. A vehicle is able to create its own pseudonyms using group signatures, i.e. the so-called Hybrid scheme. However, a pseudonym issued by the VPKI and a pseudonym created with a group signature would look different to an observer. If only one vehicle used pseudonyms created with group signature, it would easily be singled out and tracked. This thesis proposes a solution to this problem, but not the broader problem of linking messages by other means, e.g. the content of the message. In the solution, a vehicle is able to generate its own pseudonyms, using the Hybrid scheme, and make them unlinkable at the cost of computational overhead for itself and the vehicles around it, since group signatures are costly. The vehicle achieves this by aligning the lifetime of the pseudonym with other pseudonyms and asking neighboring vehicles to alternate randomly between using pseudonyms issued by the VPKI and pseudonyms created with group signatures. This alternation by neighboring vehicles decreases the linkability of pseudonyms created with group signature without increasing the linkability of pseudonyms created by the VPKI. This results in a trade off between reasonable computational overhead and acceptable linkability for pseudonyms. A short paper, presenting the scheme and results of this thesis, has been accepted to the IEEE Vehicular Networking Conference in Torino, Italy, 27-29 November, 2017 [1].
Fordonskommunikation utnyttjar temporära identiteter, dvs. pseudonymer, för att etablera säkerhet och samtidigt undvika möjligheten att spåra fordon. Om ett fordon skulle använda endast ett pseudonym så skulle en observatör kunna följa fordonet genom att observera och länka meddelanden signerade under det pseudonymet. Varje fordon erhåller därför ett set pseudonymer från kommunikationssystemet och byter pseudonym regelbundet. Om ett fordon inte kan erhålla dessa pseudonymer från systemet, så skulle fordonet inte kunna utnyttja kommunikationssystemet utan att förkasta sin integritet. Ett fordon skulle kunna skapa sina egna pseudonymer genom att använda gruppsignaturer, dvs. det så kallade Hybrid scheme. Problemet är att ett pseudonym som är erhållet från kommunikationssystemet och ett pseudonym som är genererat med en gruppsignatur, ser olika ut för en observatör. Om endast ett fordon skulle använda pseudonymer med gruppsignaturer, så skulle det enkelt filtreras ut och spåras. Den här avhandlingen föreslår en lösning på detta problem, men inte till det större problemet att länka meddelanden på andra sätt, exempelvis använda informationen i själva meddelandet. I lösningen kan fordonetgenerera egna pseudonymer, genom att använda gruppsignaturer, dvs. Hybrid scheme, och göra dem olänkbara till priset av extra beräkningstid för sig själv och fordonen omkring sig, eftersom gruppsignaturer är kostsamma. Fordonet uppnår det genom att synkronisera pseudonymernas livslängd med de andra pseudonymerna och fråga fordonen i närheten om de kan slumpmässigt växla mellan att använda pseudonymer från systemet och pseudonymer som de skapat med gruppsignaturer. Om fordon i närheten växlar mellan pseudonymer från systemet och pseudonymer genererade med gruppsignaturer så minskar länkbarheten av pseudonymer baserade på gruppsignaturer utan att öka länkbarheten av pseudonymer från kommunikationssystemet. Det resulterar i en avvägning mellan beräkningstid och acceptabel länkbarhet av pseudonymer. Ett konferens papper, som presenterar protokollet och resultatet av denna avhandling, har blivit accepterat till IEEE Vehicular Networking Conference i Torino, Italien, 27-29 November 2017 [1].
APA, Harvard, Vancouver, ISO, and other styles
15

Jacob, Jibin. "Pseudonymity in VANETS and its implications on the vehicular communication protocol stacks." Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119823.

Full text
Abstract:
Vehicular Communication (VC) network technology is in the verge of real world deployment. The technology is aimed at achieving high levels of traffic efficiency security and comfort for the users of the traffic system. The technology facilitates exchange of awareness and notification messages among the vehicles to improve the traffic efficiency and safety of the drivers. However, deployment of this awesome technology faces several security and privacy risks. The system is subjected to security risks like replay attacks, nodes sending false information to the system, denial of service attacks by clogging the networks. System also faces several privacy challenges in which sensitive user data can be eavesdropped and also tracing out a particular node using the location data sent by the node. In this research we focused on protecting the privacy of the users using the VC system. Several European projects have been working on privacy enhancement techniques for VC environments. Privacy policy enforcement approach from Privacy Enabled Capability In Co-Operative Systems and Safety Applications (PRECIOSA), pseudonym approach from Secure Vehicular Communication (SeVeCom) and Preparing secure V2X Communication Systems (PRESERVE) project which integrates the results from both PRECIOSA and SeVeCom projects are three of those projects considered in this report. This research is more focused on the pseudonym approach proposed by SeVeCom. We discuss the impact of pseudonym change on the communication stack, what other lower layer identifiers need to be changed along with the pseudonym change, and is there any other ways the attacker can still link the messages from a particular node to hamper the nodes privacy. Finally after analyzing the results from the research, we propose a solution to include a new module in the PRESERVE architecture called Identifier Change Management (IDCM) module to improve the anonymity of the user participating in the vehicular communication.
APA, Harvard, Vancouver, ISO, and other styles
16

Aichele, Fabian. "Realisierung und Evaluierung von Trust-Update-Algorithmen für das UniTEC Reputationssystem." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11144230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tang, Fugui. "A proximity determinable social pseudonym framework in online identity management system." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=107858.

Full text
Abstract:
Online identities play critical roles in the current Internet world. One of the virtues of traditional online identities, in forms of pseudonyms, is the privacy protection of online users. Users can create as many anonymous identities as they want with only an email account. However, the anonymity itself could be a limitation because of the lack of accountability.The prevalence of online social networks inspires us to create a social pseudonym framework through which it is possible to determine proximity between pseudonyms while retaining privacy. The basic idea of this work is mapping the online social network into a geometric space and assigning each user a coordinate according to the relationship with his/her neighborhood. The coordinate itself will not disclose any information of a user, but by computing the coordinates distance, proximity between users could be estimated with a certain probability. I evaluated the framework with several real online social network datasets. The results indicate that the proposed framework is promising under certain conditions.
Dans le contexte d'Internet, les identifiants des usagers jouent un rôle critique. L'un des avantages des identifiants traditionnels, soient les pseudonymes, est de fournir une protection de la vie privée des usagers. Les usagers peuvent créer autant d'identifiants anonymes qu'ils le désirent simplement en utilisant une adresse courriel. Par contre, l'anonymité même peut devenir un facteur limitant dû à la déresponsabilisation des usagers. L'importance des réseaux sociaux en ligne nous inspire à créer un système de pseudonymes sociaux à travers lequel il sera possible de déterminer la proximité entre pseudonymes tout en conservant la confidentialité. Le système se base sur l'idée d'associer un réseau social à un espace géométrique et d'assigner des coordonnées à chaque usager qui dépendent de la relation entre l'usager et son voisinage. Les coordonnées elles-même ne fournissent aucune information confidentielle à propos d'un usager. Cependant, en calculant la distance entre différentes coordonnées, la proximité entre usagers peut être estimée avec une certaine probabilité. J'ai évalué le système avec des données provenant de réseaux sociaux réels. Les résultats indiquent que le système proposé, en imposant certaines conditions, est prometteur.
APA, Harvard, Vancouver, ISO, and other styles
18

Ernstzen, Cedrine Veanca. "Regulating a pseudonym: Namibia's regulatory response to cross-border Cryptocurrency transactions." Master's thesis, Faculty of Law, 2021. http://hdl.handle.net/11427/32706.

Full text
Abstract:
In 2008 the world witnessed a transformational shift in its financial services with the introduction and subsequent adoption of cryptocurrencies. The self-regulatory nature of cryptocurrencies is an attractive feature for its users. Unfortunately, this feature is equally as attractive for criminal use. It is for this reason that in 2018 the Financial Action Task Force amended its regulatory Recommendations to extend the obligations of anti-money laundering and combating the financing of terrorism to cryptocurrency service providers and users. In turn, jurisdictions such as the European Union have amended their anti-money laundering laws to give the Recommendations effect. However, cryptocurrency transactions are presently unregulated in Namibia, despite the country also being a member state of the Financial Action Task Force. Namibia's concerns surrounding cryptocurrencies are in no way limited to their ability to corrupt the integrity of its financial industry, but also their ability to evade Namibia's capital and exchange controls. These controls preserve Namibia's foreign reserves which can theoretically be under threat by pseudonymous cross-border cryptocurrency transactions. Consequently, the imminent threat which these transactions pose, in their current form void of regulation, can arguably be quantified by their lack of transparency, accountability, and their jurisdictional concerns. Notably, cryptocurrencies have the ability to lower the entry level for financial inclusion and have the potential to propel Namibia's economic growth if cultivated correctly. Therefore, this dissertation examines whether the licensing of cryptocurrency service providers within Namibia can remedy the ills that plague cross-border cryptocurrency transactions, in order to safeguard the integrity of Namibia's financial industry and ensure the preservation of its foreign reserves without stifling innovation.
APA, Harvard, Vancouver, ISO, and other styles
19

Nikkila, Sonja Renee. "Pseudonymity, authorship, selfhood : the names and lives of Charlotte Brontë and George Eliot." Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/17556.

Full text
Abstract:
"Why did George Eliot live and Currer Bell die?" Victorian pseudonymity is seldom treated to any critical scrutiny - the only sustained interest has been in reading masculine pseudonyms as masks for "disreputable femininity," signs of the woman writer's "anxiety of authorship." This thesis proposes that pseudonymity is not a capitulation to gender ideology, but that a nom de plume is an exaggerated version of any authorial signature - the abstraction (or Othering) of a self into text which occurs in the production of "real" authors as well as fictional characters. After an introductory chapter presenting the theoretical issues of selfhood and authorship, I go on to discuss milieu - the contexts which produced Bronte and Eliot - including a brief history of pseudonymous novelists and the Victorian publishing and reviewing culture. The third and fourth chapters deal with pseudonymity as heccéité, offering "biographies" of the authorial personas "Currer Bell" and "George Eliot" rather than the women who created them, thus demonstrating the problems of biography and the relative, multiple status of identity. The three following chapters explore the concerns of pseudonymity through a reading of the novels: I treat Jane Eyre, Villette, and even Shirley as "autobiographical" in order to address the construction of self and narrative; I examine how Eliot's realist fictions (notably Scenes of Clerical Life, Romola, Middlemarch and Daniel Deronda) trouble the "reality"/"fiction" binary; and finally I read Bronte specifically for her engagement with "dress," using queer theories of performativity with Victorian theories of clothing and conduct to question "readability" itself. My final chapter is concerned with agencement (adjustment) and "mythmaking": the posthumous biographical and critical practices surrounding these two writers reveal that an author's "name," secured through literary reputation, is not static or inevitable, but the result of constant process and revision.
APA, Harvard, Vancouver, ISO, and other styles
20

Khodaei, Mohammad. "Secure Vehicular Communication Systems: Design and Implementation of a Vehicular PKI (VPKI)." Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119820.

Full text
Abstract:
The idea of vehicular communication systems could bring more safety, immunity and assurance in driving while it poses a variety of applications in traffic efficiency, driver assistance, environmental hazards, road conditions and infotainment. The aim is to make driving safer and to facilitate driving to the full extent, even on dangerous roads. However, having effective and robust operations within the VC system needs an infrastructure to handle threats, faults, illegitimate activities and unexpected incidents. Message authentication, integrity, non-repudiation and privacy within such a system are considered as the most controversial issues from security perspective. The idea is to protect privacy not only from legal point of view, but also from technical perspective in terms of using privacy enhancing technologies. To provide security within such a system, the idea of Public Key Infrastructure is considered as a promising solution. Using long-term certificates does reveal the real identity of the owner. Since users’ privacy is considered as the main security requirement in the VC system, standard certificates (X.509) and normal PKI cannot be used within a VC network. There are some functionalities and features for vehicular communication systems that do not exist in standard PKI. As a result, using pseudonym certificates to perform transactions within the VC system is a solution. In this report, a vehicular public key infrastructure, called VPKI, is proposed. OpenCA is used as the PKI, equipped with Pseudonym Certificate Authority (PCA), Long-Term Certificate Authority (LTCA) and Pseudonym Resolution Authority (PRA). These authorities are certified by the RCA and they have privileges to perform their tasks. LTCA is responsible for issuing long-term certificates while PCA is responsible for issuing pseudonym certificates. PRA is the authority to perform pseudonym resolution to identify the real identity of a pseudonym certificate. When it comes to CRL, PCA is the responsible authority to determine revoked pseudonym certificates in order to keep the system secure. Three protocols are then proposed to obtain pseudonym certificates, latest version of pseudonym CRL as well as performing pseudonym resolution. Obtaining pseudonym certificates is done in two phases. Firstly, each vehicle sends a request to LTCA to get a valid token. In the second step, the token is used by PCA to issue pseudonym certificates.
APA, Harvard, Vancouver, ISO, and other styles
21

Xu, Yijia. "Resisting whitewashing: a comparative study of fixed identity, pseudonym, and social identity." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106546.

Full text
Abstract:
The Internet has broadened the meaning of identity. In real life, we normally have fixed identities. Earlier on the Internet, pseudonym was invented to identify users. As social networks came into play, social identity was introduced. While fixed identity is the most secure one, it restricts the freedom people have on the Internet. Although pseudonym is the easiest one to create among the three identity types, it makes it equally easy for malicious users to cheat on other people. One way malicious users can perform attacks on others with pseudonym is by whitewashing, where the malicious user takes advantage of the victim, with either pre-designed plots or simply by breaking pre-defined rules, and disappear on the network but later re-join the network with a new identity so that no one would know about his previous activities. Social identity differs from the other two by making use of the relations between two people and protecting both the individual user's privacy and the organization's security. This thesis studies the effect of whitewashing under different identity types and compares their behaviors of resisting whitewashing. We use game theory to model the process of whitewashing and compute its effect upon the whole population for each identity type. In most of the cases, social identity is better at eliminating whitewashers. Besides, the Matlab simulation experiments reveal additional interesting facts about the three identity types that might shed light on future identity management schemes.
Le sens du mot "identité" s'élargit dans le contexte d'Internet. Dans la vraie vie, sauf dans des cas très particuliers, nous avons une identité fixe. Très tôt sur Internet, on a eu recours aux pseudonymes pour identifier les usagers. Avec l'évolution des réseaux sociaux est venue l'identité sociale ("social identity" en Anglais). Bien qu'elle représente le mode d'identité le plus sécuritaire, l'identité fixe impose des limites importantes qui la rendent difficile d'utilisation sur Internet. Parmi les trois modes d'identité, le pseudonyme est le plus facile à créer, mais il permet aussi aux usagers malveillants de facilement abuser de la confiance des autres. Suite aux actes malhonnêtes (arnaques ou non respect des règles établies, par exemple), un usager malveillant peut changer de pseudonyme pour blanchir son identité ("whitewashing" en anglais). Il disparaît donc du réseau pendant un certain temps pour réapparaitre plus tard sous une nouvelle identité aucunement liée à l'ancienne. L'identité sociale diffère de l'identité fixe et des pseudonymes en se basant sur les relations entre deux personnes tout en protégeant la vie privée de l'utilisateur et la sécurité de l'organisation.Cette thèse analyse les effets du blanchissage selon le mode d'identité utilisé et compare les différents comportements de résistance au blanchissage. La théorie des jeux est utilisée pour modéliser le blanchissage et calculer son effet sur la population pour chaque mode d'identité utilisé. Dans la majorité des cas, l'identité sociale est plus apte à éliminer les blanchisseurs. Des simulations Matlab révèlent aussi des faits intéressants au sujet des trois modes d'identité qui pourraient aider à l'élaboration de futurs systèmes de gestion d'identité.
APA, Harvard, Vancouver, ISO, and other styles
22

Ascárate, Luz. "The Pseudonymes of an Exception or to Philosophize after Kierkegaard, according to Paul Ricoeur." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/119530.

Full text
Abstract:
Paul Ricoeur, known as a reader of paradoxes, interprets Kierkegaard's philosophy “paradoxically” in two ways. This exception represents the paradoxical relationship of all philosophical work with the particular existence that is the philosopher, existence that must be understood as the non-philosophical source of every philosophy. The second one refers to the inside of his philosophy. In this sense, his conceptual developments represent the incompleteness of the philosophical system when it has to deal with the issue of evil: an unsolvable enigma that is thematized at the center of existence as anguish and despair. From this point of view, we formulate the question: “how can we understand the philosophical work after Kierkegaard?” and our answer claims that this meaning goes beyond philosophy itself. It consists in starting at the existence that nourishes philosophy, and enables the never-ending treatment of philosophical procedure.
Paul Ricoeur, lector de paradojas, interpreta la filosofía kierkegaardiana de forma paradójica en dos sentidos. El primer sentido hace referencia a aquella paradoja en el exterior de su filosofía y está representada por sus pseudónimos. Desde este punto de vista, Kierkegaard, el existente, es la excepción de sus pseudónimos y, con ello, representa la paradójica relación de todo filosofar con la existencia particular que es el filósofo, existencia que representa la no-filosofía fuente de todo filosofar. El segundo sentido apunta al interior de su filosofía, en tanto sus desarrollos conceptuales representan el inacabamiento del sistema filosófico al tratar la temática del mal como enigma irresoluble que se tematiza en el centro de la existencia como angustia y desesperación. A partir de esta lectura, formulamos la pregunta ¿en qué consiste filosofar después de Kierkegaard? y respondemos: consiste en filosofar más allá de la filosofía misma: a partir y con la existencia que nutre el filosofar, propiciando el tratamiento irresoluble del proceder filosófico.
APA, Harvard, Vancouver, ISO, and other styles
23

Grenabo, Erik. "Kanske en riktig författare : Om Foucaults författarfunktion, pseudonymer och omvärderingar rörande Göran Tunströms Hallonfallet." Thesis, Karlstads universitet, Institutionen för språk, litteratur och interkultur, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-55010.

Full text
Abstract:
This essay discusses how the reception and general view of an author and a work change due to consequent publications by said author. These changes are explained using Michel Foucault’s theory on the author function. The discussion centers around Göran Tunström’s book Hallonfallet, a book which initially was published under pseudonym but later re-released with the author’s proper name. The reader is then presented with a brief exposé of the reception of each of the two versions, which is then analyzed. This analysis serves as starting point for a wider discussion, referring to Tunström’s Hallonfallet as main point of reference, regarding the relation between author function, work and genre, examining how changed views concerning one of these three aspects may bring about revaluations of the others.
APA, Harvard, Vancouver, ISO, and other styles
24

Bulgarelli, Juliana. "Les représentations de la modernité brésilienne dans l'oeuvre de Paulo Barreto et ses pseudonymes." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCA111/document.

Full text
Abstract:
Durant la fin du xixème siècle et les deux premières décennies du xxème la ville de Rio de Janeiro a vécu plusieurs transformations socio-économiques associées au processus d'implantation de la modernité et de consolidation du capitalisme au brésil. les autorités 'cariocas' ont créé un projet de modernisation qui visait, par des réformes urbaines, à mettre fin aux caractéristiques d'une ville coloniale en la rapprochant des grandes cités européennes. ces réformes signifiaient, pour l'élite brésilienne, un désir de progrès et de civilisation. en même temps, celles-ci correspondaient à une tentative du brésil de poursuivre les modèles et rythmes de développement des économies européennes ainsi que leurs développements culturels et sociaux. dans ce contexte les autorités ont imposé, aussi, une transformation des coutumes, habitudes et traditions de la population, toujours dans le but de faire disparaître les anciennes traditions coloniales et les éléments de la culture populaire considérés comme marques du primitivisme et de la barbarie. c'était à cette époque et dans ce contexte des intenses changements que Paulo Barreto a produit ses œuvres et a créé plusieurs personnages. dans ses œuvres il documentait et réfléchissait sur le développement de l'urbanisation et des changements de la ville en faisant attention aux transformations que ces processus provoquaient dans la population, ses coutumes, ses interactions et sa sociabilité. ses œuvres reflètent, donc, les impositions d'un gouvernement préoccupé à civiliser la ville et la vie des ses citoyens, contrastant avec la réalité du quotidien de la population. a partit d'une observation attentive de la ville de Rio de Janeiro dans toutes ses sphères diverses et dans toutes les situations possibles du quotidien de ses habitants, il a construit d´importantes interprétations sur la dynamique et les caractéristiques de la vie moderne, ainsi que les différentes représentations de la modernité
During the end of the nineteenth century and the first decades of the twentieth, the city of Rio de Janeiro went through a series of socio-economic changes related to the process of the implementation of modernity and the consolidation of capitalism in Brazil. In this moment, local authorities, along with the elite of the country, created a modernization project whose goal was to eliminate the remaining aspects of the colonial period still present in the city, making it more similar to European capitals through urban reforms. These modifications expressed the desire for progress and civilization from the dominant Brazilian classes while also attempted to follow the example and the rhythm of social, cultural and economic development of Europe. In this context, the authorities from Rio de Janeiro imposed a transformation of habits and popular traditions with the purpose of ending the old customs from the colonial past and the elements of the popular culture that were considered primitive and barbaric. It was in this moment of great changes that Paulo Barreto wrote his work and created several characters. In his texts, he documented and pondered on the urbanization process and the transformations executed to the city of Rio de Janeiro, paying special attention to the alterations that this process caused to the population and its customs, interactions and sociability. Barreto‘s work reflects the impositions of a government concerned with the idea of civilizing the city and the life of its inhabitants in contrast with the reality of the daily life of that population. Through a close observation of the city in all its spheres and its quotidian life, he constructed relevant interpretations about the dynamics and the characteristics of modern life, as well as different representations of modernity. In this sense, this present research intends to analyse the representations of modernity constructed by Paulo Barreto throughout this work
Durante o final do século XIX e as duas primeiras décadas do século XX, a cidade do Rio de Janeiro viveu uma série de transformações socioeconômicas associadas ao processo de implantação da modernidade e de consolidação do capitalismo no Brasil. Nesse momento, as autoridades cariocas, aliadas à elite do país, criaram um projeto de modernização que visava, através de reformas urbanas, acabar com as características coloniais da cidade aproximando-a das grandes capitais européias. Essas reformas expressavam o desejo de progresso e de civilização das classes dominantes brasileiras ao mesmo tempo em que correspondiam a uma tentativa do Brasil em seguir os modelos e os ritmos de desenvolvimento social, cultural e econômico dos países europeus. Nesse contexto, as autoridades cariocas impuseram também uma transformação nos costumes, nos hábitos e nas tradições da população com o objetivo de acabar com as antigas tradições coloniais e com os elementos da cultura popular considerados como marca do primitivismo e da barbárie. É nessa época e nesse contexto de intensas mudanças que Paulo Barreto escreveu suas obras e criou seus inúmeros personagens. Nos seus textos, ele documenta e faz uma reflexão sobre o processo de urbanização e as mudanças sofridas pela cidade do Rio de Janeiro, prestando atenção nas transformações que esse processo provocou na população, seus costumes, suas interações e sua sociabilidade. Sua obra reflete as imposições de um governo preocupado em civilizar a cidade e a vida de seus cidadãos em contraste com a realidade do cotidiano da população. A partir de uma observação atenta da cidade em todas suas esferas e todas as situações possíveis do cotidiano de seus habitantes, ele construiu importantes interpretações sobre a dinâmica e as características da vida moderna, assim que diferentes representações da modernidade. Deste modo, esse trabalho de pesquisa tem como objetivo determinar as representações da modernidade brasileira construídas por Paulo Barreto no conjunto da sua obra
APA, Harvard, Vancouver, ISO, and other styles
25

Hannah, Heather. "Male use of a female pseudonym in nineteenth-century British and American literature." Thesis, Hannah, Heather (2018) Male use of a female pseudonym in nineteenth-century British and American literature. PhD thesis, Murdoch University, 2018. https://researchrepository.murdoch.edu.au/id/eprint/44781/.

Full text
Abstract:
During the nineteenth century, male writers in Britain and the United States of America used female pseudonyms much more frequently than is recognised today. The historically accepted understanding is that nineteenth-century women, not men, used cross-gender pseudonyms, a viewpoint commonly justified on the basis of presumed gender discrimination. However, previous historians and scholars have written very little about the male use of the female pseudonym in men’s authorship of literary genres. Drawing on theories of masculinity and its construction in specific historical contexts, my thesis shows why, between 1800 and 1919, increasing numbers of male writers in Britain and America authored texts under female pseudonyms, categorised by the genres of romantic fiction, juvenile literature, periodical contributions, and poetry. Histories of masculinity offer a context in which to consider how the cultural power of gendered expectations helps make sense of the male use of the female pseudonym. The insight – that male use of the female pseudonym is symptomatic of the limiting strictures of conventionally gendered boundaries in the social, professional and domestic realms – informs my thesis. Furthermore, this understanding enriches my appraisal of the more widely documented female use of the male pseudonym and enables my thorough comparison with male use of the female pseudonym. My thesis presents the first substantive catalogue and survey collating the particulars of men (forty-nine from Britain and forty-one from America) who used a female pseudonym in the nineteenth century. The thesis organises the motives that underpin the male writers’ practice of using a female pseudonym into three broad categories: personal, ideological, and commercial. It teases out these categories into numerous specific motives in order to describe, interpret, and evaluate the complexities of individual cases. Furthermore, it offers a nuanced analysis of the gendered coding of writing practices during the period, and overturns the standard narrative that the use of cross-gender pseudonyms during the nineteenth century was largely the preserve of women.
APA, Harvard, Vancouver, ISO, and other styles
26

Moncion, Isabelle. "Antoine Volodine et ses hétéronymes, ou comment constituer à soi seul une communauté d'écrivains." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/31990.

Full text
Abstract:
Après avoir publié, depuis 1985, une quarantaine d’ouvrages, Antoine Volodine est aujourd’hui reconnu comme l’un des écrivains français contemporains les plus importants. À preuve les nombreuses études qui lui ont été consacrées. Si donc plusieurs traits de son œuvre ont déjà été étudiés, il en est un qui, pourtant fondamental, n’a pas encore été abordé : les textes de l’auteur ne sont jamais signés de son orthonyme, de son nom réel, mais toujours publiés soit sous le nom d’Antoine Volodine — un pseudonyme —, soit sous la signature de plusieurs hétéronymes. Antoine Volodine et ses hétéronymes appartiennent également tous à la communauté des écrivains post-exotiques. Dans la première partie de ma thèse, j’explore les approches théoriques de la pseudonymie et de l’hétéronymie. J’examine ensuite le contenu donné à ces procédés par deux écrivains qui les ont pratiqués, Kierkegaard et Pessoa, puis je fais état des études qui ont analysé ces pratiques. J’ai mobilisé ainsi, parmi les théories du double, celles qui se rattachent plus à une scission qu’à une duplication du moi : théories psychanalytiques (Freud, Lacan) et anthropologiques (Girard). J’ai aussi exploité les notions deleuziennes de « personnage conceptuel » et de « déterritorialisation ». Dans une seconde partie, j’ai analysé quatre romans — Des anges mineurs (Volodine, 1999), Ilia Mouromietz et le rossignol brigand (E. Kronauer, 1999), Les aigles puent (L. Bassmann, 2010) et Onze rêves de suie (M. Draeger, 2010) —, ainsi que Le post-exotisme en dix leçons, leçon onze (1998), ouvrage « collectif » où est ébauchée l’esthétique d’une communauté d’écrivains. Dans le chapitre premier, j’ai repéré les différences présentes dans les œuvres signées par le pseudonyme et les divers hétéronymes afin de dégager les motivations sous-jacentes à cette pluralité d’écriture et les fins que celle-ci sert. Dans le second chapitre, j’ai exploré les ressemblances existant entre ces œuvres pour comprendre les raisons d’être de la communauté d’auteurs post-exotiques.
APA, Harvard, Vancouver, ISO, and other styles
27

Laslier, Pierre-François. "Réseaux sociaux numériques et responsabilité pénale." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0119.

Full text
Abstract:
Fers de lance de la démocratisation de la parole en ligne, les réseaux sociaux ont incontestablement bouleversé notre paysage informationnel en offrant à chacun la faculté de s’exprimer et de nouer des contacts avec d’autres personnes. Porteuses d’espoirs, ces plateformes ont également contribué à l’apparition de nouvelles formes d’atteinte qui ne pouvaient laisser indifférent le droit pénal. « Raids numériques », discours de haine, délinquance sexuelle, tromperies ou atteintes à la personnalité, voilà autant d’agissements illicites qui trouvent à être amplifiés par le canal des réseaux sociaux et qui justifient, in fine, de recourir au droit pénal. La thèse explore alors les rapports entretenus entre cette branche punitive du droit et les réseaux sociaux, et plus exactement, mesure l’incidence de ces services en ligne sur les conditions et la mise en œuvre de la responsabilité pénale. Loin de bouleverser la responsabilité pénale de fond en comble, les réseaux sociaux incitent plutôt, en raison de leurs particularités, à un renouvellement de ce mécanisme répressif. D’une part, ce sont les contours des infractions qui doivent être rénovés afin d’épouser les dimensions interactive et intrusive des réseaux sociaux ; partant, de nombreuses infractions doivent être confrontées à ces supports communicationnels inédits, tels que les délits de presse, les infractions sexuelles, les atteintes au consentement, ou encore les atteintes à la vie privée ou à l’identité. D’autre part, le fonctionnement spécifique de ces services en ligne plaide pour un renouvellement des règles liées à la répression lato sensu. Du côté des utilisateurs de réseaux sociaux, leur régime répressif mérite d’être aménagé afin de tenir compte de l’objet interactif de ces supports, nécessitant dès lors de réajuster les normes d’imputation et de sanction des infractions. Du côté des gestionnaires de ces plateformes, la prise de conscience sur leur rôle actif dans la circulation des contenus sur leur espace invite au contraire à approfondir leur régime répressif, et ce pour les contraindre à anticiper la survenance de risques infractionnels
Spearheading the democratization of online speech, social networks have undoubtedly revolutionized our informational landscape by offering everyone the opportunity to express themselves and connect with others. Bearers of hope, these platforms have also contributed to the emergence of new forms of infringement that criminal law could not ignore. Digital raids, hate speech, sexual offences, deceit and offences to the personality, are some of the unlawful acts that are amplified by social networks, and that ultimately justify resorting to criminal law. The thesis delves into the relationship between this punitive branch of the law and social networks, and, more precisely, measures the impact of these online services on the conditions of criminal liability. Far from turning criminal liability upside down, the features of social networks spur a renewal of this repressive mechanism. On the one hand, the contours of the offences need to be renewed in order to embrace the interactive and intrusive dimensions of social networks. As a result, many offenses have to be confronted with these new communication media, such as press offences, sexual offenses, offenses against consent or offenses against privacy or identity. On the other hand, the specific functioning of these online services calls for a renewal of the rules relating to the repression lato sensu. Regarding social networks users, their repressive regime needs to be adapted to take the interactive nature of these media into account. Thus, the rules of attribution and punishment of the offenses have to be adjusted. Regarding platform managers, the growing awareness of their active role in the circulation of contents calls for a deepening of their repressive regime, in order to force them to anticipate the occurrence of offenses risks
APA, Harvard, Vancouver, ISO, and other styles
28

Emanuelsson, Sofia. ""HEN är bara en pseudonym för fega butches" : Konstruktioner av kön i debatten om hen." Thesis, Uppsala universitet, Institutionen för nordiska språk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-192358.

Full text
Abstract:
I den här uppsatsen presenteras en undersökning om konstruktioner av kön i debatten om hen. Syftet är att utifrån ett queerteoretiskt perspektiv ta reda på hur kön och hen konstrueras i en internetbaserad debatt om ordet. Undersökningen baseras på kommentarerna under ett blogginlägg om ordet hen. Det kvalitativa analysverktyget som används är membership categorization analysis (MCA). Resultatet visar att de personer som är emot användning av ordet hen är under föreställningen att ordet används för att avköna samhället, medan förespråkarna anser att ordets främsta användningsområde är som ett komplement till pronomenen han och hon. Kön konstrueras på ett tydligt sätt av motståndarna till hen, medan förespråkarna till ordet anstränger sig för att inte konstruera kvinnor och män. När kön konstrueras handlar det nästan uteslutande om konstruktion och kategorisering av kvinnor, konstruktion av män lämnas utanför debatten. Den heterosexuella matrisen och tvåkönsmodellen verkar tydligt i konstruktionen av hen och av kön och det finns en tydlig motsättning mellan motståndarna och förespråkarna till hen, då motståndarna ofta har ett essentialistiskt synsätt på kön medan förespråkarna har ett socialkonstruktivistiskt.
APA, Harvard, Vancouver, ISO, and other styles
29

Salbato, Jeffrey Charles. "Interpreting Kierkegaard's major religious pseudonyms reading Fear and trembling, Philosophical fragments, and the Concluding unscientific postscript /." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nordbeck, Sebastian. "Vem vill inte vara sig själv En essä om alter egon av Sebastian Nordbeck." Thesis, Kungl. Konsthögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kkh:diva-209.

Full text
Abstract:
Vem vill inte vara sig själv [Who Doesn't to be Himself]  opens a discussion on the meaning and function of the alter ego in contemporary culture. In the essay the writer goes back and forth between describing and analyzing the examples he presents, mainly subcultural and media influenced facts and phenomena, and here and there he connects them to personal experiences, among other things the part the alter ego played in his first meeting with art.
APA, Harvard, Vancouver, ISO, and other styles
31

Marden, Michael Patrick Pasley Jeffrey L. "Concealed authorship on the eve of the revolution pseudonymity and the American periodical public sphere, 1766-1776 /." Diss., Columbia, Mo. : University of Missouri--Columbia, 2009. http://hdl.handle.net/10355/6477.

Full text
Abstract:
Title from PDF of title page (University of Missouri--Columbia, viewed on Feb 18, 2010). The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Thesis advisor: Dr. Jeffrey Pasley. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
32

Pilon, Simone. "Constitution du corpus des écrits des femmes dans la presse canadienne-française entre 1883 et 1893 et analyse de l'usage des pseudonymes." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0016/NQ48549.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lafond, Hélène. "L'univers romanesque d'Émile Ajar ou Le refus de la norme." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60626.

Full text
Abstract:
In 1973, Emile Ajar published his first novel, Gros-Calin, and his very unusual style drew public attention. In fact, the name of Emile Ajar conceals a famous writer, Romain Gary. He endeavours to escape from the iron grip of criticism and attempts to renew his writing by resorting to an assumed name. This thesis is based on the fictitious world of Emile Ajar and the rejection of societal norms. A close study of the composition of this fictitious universe permits the reader to unravel its particular nature. The first chapter explains the structure of the various tales and their characteristics such as the relationship between the narrator and the narrative, between the narrator and the reader, and between the subject and the means used by the hero to relate his experience. This analysis discloses how the author conceals the threads of his tale to captivate his audience more successfully. The second chapter presents society as it is; its characteristics, symbols and the hero's response to this environment. The last chapter explores the characteristics, symbols and the behaviour of the hero in a world characterized by antisocietal values. It reveals the importance and the meaning of this "antisociety" and Emile Ajar's rejection of the status quo.
APA, Harvard, Vancouver, ISO, and other styles
34

Ruby, Michael [Verfasser]. "Magnetic Impurities on a Superconductor: from Single Atoms to Coupled Chains / Michael Kleinert unter dem offiziellen Pseudonym Michael RUBY." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1136319360/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Plewtong, Nicholas. "Modeling Adversarial Insider Vehicles in Mix Zones." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1810.

Full text
Abstract:
Security is a necessity when dealing with new forms of technology that may not have been analyzed from a security perspective. One of the latest growing technological advances are Vehicular Ad-Hoc Networks (VANETs). VANETs allow vehicles to communicate information to each other wirelessly which allows for an increase in safety and efficiency for vehicles. However, with this new type of computerized system comes the need to maintain security on top of it. In order to try to protect location privacy of the vehicles in the system, vehicles change pseudonyms or identifiers at areas known as mix zones. This thesis implements a model that characterizes the attack surface of an adversarial insider vehicle inside of a VANET. This adversarial vehicle model describes the interactions and effects that an attacker vehicle can have on mix zones in order to lower the overall location privacy of the system and remain undetected to defenders in the network. In order to reach the final simulation of the model, several underlying models had to be developed around the interactions of defender and attacker vehicles. The evaluation of this model shows that there are significant impacts that internal attacker vehicles can have on location privacy within mix zones. From the created simulations, the results show that having one to five optimal attackers shows a decrease of 0.6%-2.6% on the location privacy of the network and a 12% decrease in potential location privacy in a mix zone where an attacker defects in a 50-node network. The industry needs to consider implementing defenses based on this particular attack surface discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Min-Ho. "Socrate dans l'œuvre de kierkegaard : l'examen de la conception kierkegaardienne de Socrate dans la thèse universitaire et l'œuvre pseudonyme de Kierkegaard." Paris 1, 2001. http://www.theses.fr/2001PA010502.

Full text
Abstract:
Dans cette thèse, il s'agit d'étudier la conception kierkegaardienne de Socrate telle qu'elle est présentée dans la thèse universitaire et l'œuvre pseudonyme de Kierkegaard sept textes sont examinés un à un : le concept d'ironie dans la première partie, post-scriptum aux miettes philosophiques dans la deuxième partie et cinq autres textes pseudonymes dans la troisième partie. L'examen va montrer en quoi le Socrate du concept d'ironie et celui du post-scriptum diffèrent l'un de l'autre et en quoi le Socrate de chacun des cinq textes pseudonymes peuvent être ramené à celui du post-scriptum.
APA, Harvard, Vancouver, ISO, and other styles
37

Martin, Marcienne. "Les constructions identitaires du sujet à travers la mise en place de pseudonymes et l'émergence d'un nouveau code langagier via l'outil Internet." Phd thesis, Université de la Réunion, 2005. http://tel.archives-ouvertes.fr/tel-00484359.

Full text
Abstract:
Les recherches entreprises dans le cadre de cette thèse ont pour objet l'analyse des nouvelles constructions identitaires du sujet communiquant, générées par l'usage de l'outil Internet. Ces constructions vont se définir à la fois à travers le pseudonyme choisi par l'internaute et le nouveau code langagier mis en place par les usagers de cet outil de communication. Nos recherches touchent principalement des domaines comme l'onomastique, la communication et ses codes langagiers. De nombreuses problématiques seront abordées : l'usage du pseudonyme sur l'Internet, comme seule alternative anthroponymique, ne signe-t-elle pas un espace social spécifique et différent de ceux existants dans la vie réelle ? Nous nous interrogerons également sur l'ambiguïté de ce nouveau code langagier mis en place sur l'Internet. En effet, elle réside dans cette double fonction antagoniste : l'utilisation de la fonction de l'écrit en ce qui concerne le support et la sollicitation de la fonction de l'oral lors de l'acte conversationnel. A travers tous ces questionnements, c'est le statut de l'homme qui est renégocié. Nous assistons à la naissance d'une nouvelle forme de communication : chacun est en relation avec un autre, présent quelque part, mais que nous ne rencontrerons peut-être jamais. Ne sommes-nous pas à l'aube d'une nouvelle ère qui ouvrirait un monde sur un imaginaire roi ?
APA, Harvard, Vancouver, ISO, and other styles
38

Jorge, Manuel dos Santos. "Fernando Pessoa : identités et hétéronymes." Paris 7, 1994. http://www.theses.fr/1994PA070123.

Full text
Abstract:
Poussant jusqu'à la limite de l'excellence la tendance à la polynymie (pseudonymie heteronymique), déployée par Soren Kierkegaard, Fernando Pessoa créa une "littérature éprouvée dans la personne de "l'autre" : les hétéronymes. Car, "l'oeuvre hétéronyme est de l'auteur dehors de sa propre personne". Le quaternaire hétéronymique Pessoen représente pour le psychanalyste des hypostases des modes axiaux de l'identification d'après Freud. Les quatre hétéronymes (majeurs) revenants de figures-imagos rejetées lors de la constitution foncière du moi, font retour non seulement pour accomplir le cycle de l'oeuvre mais surtout pour tenir le sujet aux rets d'un destin d'homme. De la sorte, le poète lusitanien témoigne de l'embarras de tout un chacun de devenir un sujet ancre dans une histoire faite d'une pluralité d'accointances inconscientes et conscientes. Et la recommandation nécessaire d'identité autour des quatre axes identificatoires signe pour chacun le noeud du symbolique (reconnaissance de soi et d'autrui) toujours en appel auprès de l'ouvert propre à la contingence humaine
The four heteronyms of the portuguese poet, Fernando Pessoa import, as to the freudian theory of identification, the hypostasis of each identification axial form. Pessoa call from the old construction of ego, a few (four) refused imago for his work completion and his personal unity promotion like a subject one
APA, Harvard, Vancouver, ISO, and other styles
39

Hadouche, Dris Leïla Louise. "La construction de soi dans l'écriture littéraire. Le cas d'Isabelle Eberhardt." Paris 8, 2010. http://octaviana.fr/document/156366126#?c=0&m=0&s=0&cv=0.

Full text
Abstract:
La place et l’importance de l’écriture dans la construction en analyse ne sont plus à démontrer. Freud est l’un des premiers à y faire allusion dans Construction et analyse. Mais qu’en est-il lorsque l’une des étapes de l’écriture de la reconstruction de soi se fait par l’écriture de soi comme autre, autrement dit par le truchement du pseudonyme ? Comment l’écriture permet-elle de corriger l’infirmité d’une identité et la souffrance d’être soi-même ? Comment permet-elle de combler l’absence d’un père et de corriger une relation maternelle définie d’emblée comme pathologique ? Telles sont les questions soulevées par ce travail. Pour y répondre et enrichir la réflexion psychanalytique relative aux écritures du moi, nous nous intéressons au journal intime, aux correspondances et à une partie des nouvelles d’Isabelle Eberhardt
The place and the importance of the writing construction in analysis are no longer to be demonstrated. Freud is one of the firsts to make allusion in Construction et analyse. But what is it when one of the steps of self writing is done by self writing as another; in other words, by intermediary pseudonyme? How can writing correct desableted identity and the suffering to be ? How can it fullfill in father absence and correct the mother relation défined as being pathologic? These are the raised questions in this research. To answer it and enrich the psychanalitic reflexion in relation to the self writing, we will be interestd in Isabelle Eberhardt’s diary, correspondences and a part of her short stories
APA, Harvard, Vancouver, ISO, and other styles
40

Abbott, Reed S. "CPG : closed pseudonymous groups /." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2292.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Scheider, Frédéric. "Le roman familial de gary/ajar : une illustration litteraire du clivage." Lyon 1, 1992. http://www.theses.fr/1992LYO1M017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Oliveira, Ranis Fonseca de. "A comunicação existencial na filosofia de Søren Aabye Kierkegaard." Pontifícia Universidade Católica de São Paulo, 2014. https://tede2.pucsp.br/handle/handle/11671.

Full text
Abstract:
Made available in DSpace on 2016-04-27T17:27:09Z (GMT). No. of bitstreams: 1 Ranis Fonseca de Oliveira.pdf: 1448737 bytes, checksum: 3882cbbccd65bc32b14973ed936dc835 (MD5) Previous issue date: 2014-12-12
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
This thesis proposes to examine as a mainstay in the theoretical literature and the existential philosophy of communication Søren Aabye Kierkegaard (1813-1855). The author's existential communication is understood as communication of reflection, which addresses the individual and not the mass. Accordingly, this communication is done indirectly and justified in interpreting that existence is too contradictory to be considered and appraised objectively. The existential communication is the feature that the Danish thinker developed to position himself in front of Christendom, this is, the trivialization of real Christianity. For this, we used irony and pseudonymity
A presente tese propõe-se a analisar, com esteio em pesquisa teórica e bibliográfica, a comunicação existencial na filosofia de Søren Aabye Kierkegaard (1.813 1.855). A comunicação existencial do autor é compreendida como comunicação de reflexão, que se dirige ao Indivíduo e não à massa. Nesse sentido, tal comunicação é realizada indiretamente e justifica-se na interpretação de que a existência é muito contraditória para ser pensada e conceituada objetivamente. A comunicação existencial é o recurso que o pensador dinamarquês desenvolveu para posicionar-se diante da filosofia do Sistema, como também diante da cristandade, isto é, da banalização do verdadeiro cristianismo. Para tanto, utilizou-se da ironia e da pseudonímia
APA, Harvard, Vancouver, ISO, and other styles
43

Nestelbaum-Guez, Maya. "Le cri de la judéïté et de la Shoah dans l'œuvre littéraire de Romain Gary." Paris 8, 2011. http://www.theses.fr/2011PA083415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Martucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.

Full text
Abstract:
In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. This dissertation concentrates on the achievement of privacy-friendly identifiersand anonymous communication in ad hoc networks. In particular, the objective is to offer means for better anonymous communication in such networks. Two research questions were formulated to address the objective: I. How to design proper and trusted privacy-friendly digital identifiers to beused in ad hoc network environments? II. How to provide anonymous communication in ad hoc networks and whatis the performance cost in relation to the obtained degree of anonymity? To address the first research question we studied and classified the security and privacy threats, enhancements, and requirements in ad hoc networks and analyzed the need for privacy and identification. The analysis led us to the relationship between security, identification, and anonymous communication that we refer to as the “identity-anonymity paradox”. We further identifiedthe requirements for privacy-friendly identifiers and proposed the self-certified Sybil-free pseudonyms to address such requirements. The second research question was addressed with the design and implementation of the Chameleon protocol, an anonymous communication mechanism for ad hoc networks. The performance of Chameleon was evaluated using a network simulator. The results were used to find out the trade-off between anonymity and performance in terms of the expected end-to-end delay. The solutions proposed in this dissertation are important steps towards the achievement of better anonymous communications in ad hoc networks andcomplement other mechanisms required to prevent leaks of personal data.
APA, Harvard, Vancouver, ISO, and other styles
45

Andersson, Christer. "Enhancing Privacy for Mobile Networks : Examples of Anonymity Solutions and Their Analysis." Licentiate thesis, Karlstad University, Division for Information Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-1560.

Full text
Abstract:

Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.

One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.

This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation

and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc

networks, a required building block for ambient intelligence.

APA, Harvard, Vancouver, ISO, and other styles
46

Quenneville-Labelle, Frédéric. "Madeleine à La Revue moderne : une approche sociopoétique (1919-1923)." Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25580.

Full text
Abstract:
Dans ce mémoire, nous examinons l’effet de polyphonie mis en place par Madeleine (de son vrai nom Anne-Marie Gleason-Huguenin) dans les quarante-sept premiers numéros (novembre 1919 - septembre 1923) de La Revue moderne. L’usage de multiples pseudonymes permet à Madeleine de préserver la posture d’écrivaine qu’elle s’est construite dans le champ des lettres canadiennes-françaises. En effet, cette pratique est une forme de protection et de garantie pour la liberté d’écriture, laissant ses autres noms de plume tenir des propos plus provocants que ce qu’elle se permet sous sa signature principale. Après un premier chapitre faisant le point sur la carrière de Madeleine, nous analysons dans un deuxième chapitre cette stratégie polyphonique qui se constitue autour du rôle de la directrice de La Revue moderne, notamment pour l’agencement des rubriques : grâce à une multiplication des identités, Madeleine peut occuper divers lieux de sa revue. Enfin, le dernier chapitre étudie la manière dont ces différentes identités journalistiques se constituent au travers d’une certaine solidarité, par échos et reprises.
APA, Harvard, Vancouver, ISO, and other styles
47

Atif, Ayub, and Justin Arieltan. "Secure and Privacypreserving V2X multicast DNS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281396.

Full text
Abstract:
The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. In particular, vehicular communications outside the coverage of roadside infrastructure needs to be preserved. Multicast DNS is proposed as a method to restrict queries to vehicles in a Vehicle-to-Everything environment which could include other connected devices. Contemporary DNS applications rely on robust security protocols provided by the DNS Security Extensions to authenticate responses and verify resource records. Vehicular DNS communications need authentication to verify the source and legitimacy of DNS resource records. This can be achieved through multihop Vehicle- to-Vehicle communications to reach a name server supplemented by a novel approach to verify records using the Bloom filter.In this thesis, we analyze the security and privacy risks posed by a non-authenticated baseline communication protocol. We then build a secure and privacy-preserving networked system based on pseudonym certificate-based public key infrastructure solution. The experimental analysis confirmed the improvement on security and privacy at the cost of communication and computation overhead.
Domännamnssystemet är en hierarkisk benämningssystem som ger information om nätverksresurser eller tjänster för givna domännamn. DNS application i fordon nätverk framkallar nya utmaningar när det handlar om datasäkerhet och fordons integritet. Det är särskilt fordon kommunikation utanför vägkant-infrastrukturens räckvidd som behöver bevara och försäkra operationer av DNS applikation i fordon nätverk. Multicast DNS är en föreslagen metod för att begränsa förfrågan till fordon i en fordon-till-all-miljö som kan inkludera andra anslutna enheter. Nuvarande applikationer förlitar sig på en robust säkerhetsprotokoll som kommer från DNS säkerhetsförlängning för att autentisera svar och verifiera resurs rekord. Fordon DNS kommunikationer behöver autentisering för att verifiera källor och legitimitet av DNS resurs rekord. Detta kan uppnås genom multihop fordon-till-fordon kommunikation för att ansluta sig till en namn server med hjälp av en ny metod för att verifiera uppgifter med hjälp av bloomfilter datastruktur.I tesen analyserar vi risken som finns i en icke-autentiserad integritets-läckande kommunikationsprotokoll. Vi bygger sedan ett nätverk och använder en pseudonym certifikatbaserad publik nyckel infrastruktur lösning för att undersöka förbättringar inom säkerhet och integritet. Analysen från experimenten visar att det finns en förbättring för säkerhet och integritet i utbyte mot tidsprestanda, vilket är en intressant kompromiss.
APA, Harvard, Vancouver, ISO, and other styles
48

Ma, Yingying. "Impact of social media use on political participation : narcissism, perceived anonymity and social norms as mediators." HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/677.

Full text
Abstract:
Social media use is a pivotal driver for political engagement. The present study extended previous research by exploring the simple and serial mediating roles of narcissism, perceived anonymity, descriptive norms, and subjective norms in this relationship. Structural equation modeling (SEM) with bootstrapping estimation was conducted for hypothesis testing using data from 579 Hong Kong university students. Modeling results revealed that perceived anonymity, descriptive norms, and subjective norms are significant mediators of the relationship between social media use and political participation. Moreover, descriptive norms, together with perceived anonymity, were found to mediate the relationship. Likewise, narcissism combined with descriptive norms proved to be significant mediators of the relationship. Additionally, a distal mediation effect of descriptive norms and subjective norms proved to be significant. Based on these results, a subsequent parallel mediation analysis was conducted, revealing that perceived anonymity is the most influential indicator among perceived anonymity, subjective norms, and descriptive norms of the relationship of social media use and political participation. The study concluded by comparing male and female respondents in terms of political participation. The result showed that male respondents were generally more active than female respondents in both online and offline political activities, which agrees with prior research findings. Collectively, the current study provides a new perspective from which we can further understand the effects of social media use on political engagement.
APA, Harvard, Vancouver, ISO, and other styles
49

Noroozi, Hamid. "A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300658.

Full text
Abstract:
Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). It also offers a level of privacy for vehicles as VPKI provides them with a set of non-linkable short-lived certificates, called pseudonyms, which are used to sign outgoing messages by vehicles while they communicate with other vehicles referred to as Vehicle-to-Vehicle (V2V) or Roadside Units (RSUs) referred to as Vehicle-to-Infrastructure (V2I). Each vehicle uses a pseudonym for its lifetime and by switching to a not- previously- used pseudonym, it continues to communicate without risking its privacy. There have been two approaches suggested by the literature on how to provide vehicles with pseudonyms. One is the so-called pre-loading mode, suggesting to pre-load vehicles with all pseudonyms they need, which increases the cost of revocation in case they are compromised. The other one is the on-demand mode, suggesting a real-time offering of pseudonyms by VPKI at vehicles request e.g., on starting each trip. Choosing the on-demand approach imposes a considerable burden of availability and resilience on VPKI services. In this work, we are confronting the problems regarding a large-scale deployment of an on-demand VPKI that is resilient, highly available, and dynamically scalable. In order to achieve that, by leveraging state-of-the-art tools and design paradigms, we have enhanced a VPKI system to ensure that it is capable of meeting enterprise-grade Service Level Agreement (SLA) in terms of availability, and it can also be cost-efficient as services can dynamically scale-out in the presence of high load, or possibly scale-in when facing less demand. That has been made possible by re-architecting and refactoring an existing VPKI into a cloud-native solution deployed as microservices. Towards having a reliable architecture based on distributed microservices, one of the key challenges to deal with is Sybil-based misbehavior. By exploiting Sybil-based attacks in VPKI, malicious vehicles can gain influential advantage in the system, e.g., one can affect the traffic to serve its own will. Therefore, preventing the occurrence of Sybil attacks is paramount. On the other hand, traditional approaches to stop them, often come with a performance penalty as they verify requests against a relational database which is a bottleneck of the operations. We propose a solution to address Sybil-based attacks, utilizing Redis, an in-memory data store, without compromising the system efficiency and performance considerably. Running our VPKI services on Google Cloud Platform (GCP) shows that a large-scale deployment of VPKI as a Service (VPKIaaS) can be done efficiently. Conducting various stress tests against the services indicates that the VPKIaaS is capable of serving real world traffic. We have tested VPKIaaS under synthetically generated normal traffic flow and flash crowd scenarios. It has been shown that VPKIaaS managed to issue 100 pseudonyms per request, submitted by 1000 vehicles where vehicles kept asking for a new set of pseudonyms every 1 to 5 seconds. Each vehicle has been served in less than 77 milliseconds. We also demonstrate that, under a flash crowd situation, with 50000 vehicles, VPKIaaS dynamically scales out, and takes ≈192 milliseconds to serve 100 pseudonyms per request submitted by vehicles.
Ansträngningar för standardisering av Vehicular Communication Systems har varit avgörande för användandet av Vehicular Public-Key Infrastructure (VPKI) för att etablera förtroende mellan nätverksdeltagare. Användande av VPKI i Vehicular Communication (VC) garanterar integritet och autenticitet av meddelanden. Det erbjuder ett lager av säkerhet för fordon då VPKI ger dem en mängd av icke länkbara certifikat, kallade pseudonym, som används medan de kommunicerar med andra fordon, kallat Vehicle-to-Vehicle (V2V) eller Roadside Units (RSUs) kallat Vehicle-to-Infrastructure (V2I). Varje fordon använder ett pseudonym under en begränsad tid och genom att byta till ett icke tidigare använt pseudonym kan det fortsätta kommunicera utan att riskera sin integritet. I litteratur har två metoder föreslagits för hur man ska ladda fordon med pseudonym de behöver. Den ena metoden det så kallade offline-läget, som proponerar att man för-laddar fordonen med alla pseudonym som det behöver vilket ökar kostnaden för revokering i fall de blir komprometterat. Den andra metoden föreslår ett on-demand tillvägagångssätt som erbjuder pseudonym via VPKI på fordonets begäran vid början av varje färd. Valet av på begäran metoden sätter en stor börda på tillgänglighet och motståndskraft av VPKI tjänster. I det här arbetet, möter vi problem med storskaliga driftsättningar av en på begäran VPKI som är motståndskraftig, har hög tillgänglighet och dynamiskt skalbarhet i syfte att uppnå dessa attribut genom att nyttja toppmoderna verktyg och designparadigmer. Vi har förbättrat ett VPKI system för att säkerställa att det är kapabelt att möta SLA:er av företagsklass gällande tillgänglighet och att det även kan vara kostnadseffektivt eftersom tjänster dynamiskt kan skala ut vid högre last eller skala ner vid lägre last. Detta har möjliggjorts genom att arkitekta om en existerande VPKI till en cloud-native lösning driftsatt som mikrotjänster. En av nyckelutmaningarna till att ha en pålitlig arkitektur baserad på distribuerade mikrotjänster är sybil-baserad missuppförande. Genom att utnyttja Sybil baserade attacker på VPKI, kan illvilliga fordon påverka trafik att tjäna dess egna syften. Därför är det av största vikt att förhindra Sybil attacker. Å andra sidan så dras traditionella metoder att stoppa dem med prestandakostnader. Vi föreslår en lösning för att adressera Sybilbaserade attacker genom att nyttja Redis, en in-memory data-store utan att märkbart kompromissa på systemets effektivitet och prestanda. Att köra våra VPKI tjänster på Google Cloud Platform (GCP) och genomföra diverse stresstester mot dessa har visat att storskaliga driftsättningar av VPKI as a Service (VPKIaaS) kan göras effektivt samtidigt som riktigt trafik hanteras. Vi har testat VPKIaaS under syntetisk genererat normalt trafikflöde samt flow och flash mängd scenarier. Det har visat sig att VPKIaaS klarar att utfärda 100 pseudonym per förfråga utsänt av 1000 fordon (där fordonen bad om en ny uppsättning pseudonym varje 1 till 5 sekunder), och varje fordon fått svar inom 77 millisekunder. Vi demonstrerar även att under en flashcrowd situation, där antalet fordon höjs till 50000 med en kläckningsgrad på 100. VPKIaaS dynamiskt skalar ut och tar ≈192 millisekunder att betjäna 100 pseudonymer per förfrågan gjord av fordon.
APA, Harvard, Vancouver, ISO, and other styles
50

Mongoin, David. "La doctrine constitutionnelle du Federaliste : La question d'institutions libérales après le régime mixte." Paris 2, 2007. http://www.theses.fr/2007PA020082.

Full text
Abstract:
Ce travail est prioritairement une analyse de l’ouvrage intitulé Le Fédéraliste et solidairement une étude sur la fondation constitutionnelle américaine. Il cherche à déterminer comment les Pères fondateurs américains ont entendu sauvegarder les équilibres assurés par le régime mixte dans une société d’égalité de droits. On capture classiquement l’essence du régime américain en l’enfermant dans la formule de « république fédérale ». Cette étude a pour finalité de déterminer ce qu’elle recouvre originellement. Après une analyse philologique de l’ouvrage, cette thèse cherche à montrer que ses auteurs demeurent fidèles à l’idéal du régime mixte, tout en tentant de tirer certaines conséquences institutionnelles de cet état social d’égalité. Cette tension va donner naissance à un régime complexe où la liberté repose, non sur la loi, mais sur le jeu institutionnel, c’est-à-dire sur le pouvoir. Il s’agit également de démontrer que le fédéralisme joue un rôle secondaire dans ce libéralisme politique. Pour ce faire, cette étude propose une distinction entre la question de la structure fédérale et celle de la taille de la république. Le fédéralisme du Fédéraliste se présente ainsi comme un simple dualisme du pouvoir qui permet de donner une structure pertinente pour assurer l’extension de la sphère républicaine.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography