Tesi sul tema "Pseudonymat"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Pseudonymat".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Luneau, Marie-Pier. "Les Lionel Groulx : la pseudonymie comme stratégie littéraire et jeu institutionnel (1900-1966)". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1996. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21797.pdf.
Testo completoOmari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music". Universitätsbibliothek Leipzig, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-90542.
Testo completoMollaret, Damien. "Le détour par l'autre : plurilinguisme et pseudonymie dans les oeuvres de Fernando Pessoa, Vladimir Nabokov, Jorge Luis Borges et Romain Gary". Thesis, Bordeaux 3, 2019. http://www.theses.fr/2019BOR30026.
Testo completo“I cannot stand my real name, I feel immediately stuck” says the narrator of Pseudo, a Romain Gary novel authored under his pseudonym, Émile Ajar. He adds that he “has attempted everything to run away from [himself]”. He tried specially to learn different languages and even to invent his own. Like Gary other writers have considered their mother tongue or their surname as restraints limiting their possibilities. In order to “feel everything in every way” (Pessoa’s expression) they would change their language or use pseudonyms. To jointly study multilingualism and the use of pseudonyms, we focused on four 20th century authors: the Portuguese poet Fernando Pessoa (1888-1935), the Russian-American novelist Vladimir Nabokov (1899-1977), the Argentinian writer Jorge Luis Borges (1899-1986) and the French novelist Romain Gary (1914-1980). The writings of all four authors are at the intersection of several languages and cultures. In addition to their mother tongue, they each mastered French and English. They used English as a second language for their writing, were translators and/or self-translators. Additionally, all four took pseudonyms and invented fictitious alter egos. Pessoa’s concept of heteronym (closely connected to his multilingualism) allowed us to shed light on the work of the three other authors. To do this, we compared Pessoa’s main heteronyms with those of Bustos Domecq (pseudonym of Borges and Bioy Casares), Emile Ajar (pseudonym of Gary, embodied as the straw man Paul Pavlowitch) and Sirine (Nabokov’s Russian alter ego). Like translation, heteronymous writing requires some depersonalization. And like self-translation, it forces the author to confront an alter ego. To write in another language or to invent a new style in one’s own language, one must renounce a part of one’s self. This thesis aims to show that for these authors using pseudonyms and writing in different languages represents less of a rejection of their identities than an indirect way to come back to themselves. Freed from themselves by their heteronyms, they can better appreciate who they are, be self-critical and thus they can open their hearts to their readers. Writing in a second language also creates a certain distance that enables them to confess and experiment
Lysyanskaya, Anna. "Pseudonym systems". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80544.
Testo completoBar-Kochva, Sharon. "Les pseudonymes dans les littératures yiddish et hébraïque du milieu du XIXe siècle au milieu du XXe siècle". Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCF001.
Testo completoModern Yiddish and Hebrew literatures are closely connected by a common long history, sharing many stylistic and thematic features. However, both literatures significantly differ in their use of pseudonyms. In Yiddish literature, authors’ pseudonyms appear rather frequently, and a significant number of the most important writers are known mainly in their pseudonyms, while in modern Hebrew literature pen names remained a relatively marginal occurrence. This research analyses pseudonymity in both literatures in order to explain this discrepancy. In the first chapter, the various patterns used in building pseudonyms are analysed, so to establish a general typology of the phenomenon. Subsequently, I focus on the "lasting" pseudonyms, namely those that accompany authors for a long time, shaping and determining their public image. In the second chapter I describe in detail under which circumstances and in what ways the "lasting" pseudonyms were created and used. Finally, in the last part the information analysed previously is utilised, clarifying that pseudonymity is actually a social phenomenon, and defining the social and historical factors that led to the adoption of pseudonymity as one of the "invented traditions" of modern Yiddish literature
Omari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music". Swahili Forum 18 (2011), S. 69-86, 2011. https://ul.qucosa.de/id/qucosa%3A11465.
Testo completoWilder, Terry L. "New Testament pseudonymity and deception". Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU099071.
Testo completoYarygina, Tatiana. "Women's Pseudonyms in Russian Modernism". Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18349.
Testo completoYieh, Pierson. "Vehicle Pseudonym Association Attack Model". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.
Testo completoBenin, Joseph Thomas. "Unified distribution of pseudonyms in hybrid ephemeral vehicular networks". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45910.
Testo completoRobertson, Malcolm J. "The authorship of 1 Peter pseudonym or apostolic witness /". Theological Research Exchange Network (TREN), 1988. http://www.tren.com.
Testo completoSchmidt, Jochen. "Vielstimmige Rede vom Unsagbaren Dekonstruktion, Glaube und Kierkegaards pseudonyme Literatur". Berlin New York de Gruyter, 2005. http://deposit.ddb.de/cgi-bin/dokserv?id=2704206&prov=M&dok_var=1&dok_ext=htm.
Testo completoSchmidt, Jochen. "Vielstimmige Rede vom Unsagbaren Dekonstruktion, Glaube und Kierkegaards pseudonyme Literatur /". Berlin : De Gruyter, 2006. http://site.ebrary.com/lib/librarytitles/Doc?id=10154755.
Testo completoMessing, Andreas. "A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184.
Testo completoFordonskommunikation utnyttjar temporära identiteter, dvs. pseudonymer, för att etablera säkerhet och samtidigt undvika möjligheten att spåra fordon. Om ett fordon skulle använda endast ett pseudonym så skulle en observatör kunna följa fordonet genom att observera och länka meddelanden signerade under det pseudonymet. Varje fordon erhåller därför ett set pseudonymer från kommunikationssystemet och byter pseudonym regelbundet. Om ett fordon inte kan erhålla dessa pseudonymer från systemet, så skulle fordonet inte kunna utnyttja kommunikationssystemet utan att förkasta sin integritet. Ett fordon skulle kunna skapa sina egna pseudonymer genom att använda gruppsignaturer, dvs. det så kallade Hybrid scheme. Problemet är att ett pseudonym som är erhållet från kommunikationssystemet och ett pseudonym som är genererat med en gruppsignatur, ser olika ut för en observatör. Om endast ett fordon skulle använda pseudonymer med gruppsignaturer, så skulle det enkelt filtreras ut och spåras. Den här avhandlingen föreslår en lösning på detta problem, men inte till det större problemet att länka meddelanden på andra sätt, exempelvis använda informationen i själva meddelandet. I lösningen kan fordonetgenerera egna pseudonymer, genom att använda gruppsignaturer, dvs. Hybrid scheme, och göra dem olänkbara till priset av extra beräkningstid för sig själv och fordonen omkring sig, eftersom gruppsignaturer är kostsamma. Fordonet uppnår det genom att synkronisera pseudonymernas livslängd med de andra pseudonymerna och fråga fordonen i närheten om de kan slumpmässigt växla mellan att använda pseudonymer från systemet och pseudonymer som de skapat med gruppsignaturer. Om fordon i närheten växlar mellan pseudonymer från systemet och pseudonymer genererade med gruppsignaturer så minskar länkbarheten av pseudonymer baserade på gruppsignaturer utan att öka länkbarheten av pseudonymer från kommunikationssystemet. Det resulterar i en avvägning mellan beräkningstid och acceptabel länkbarhet av pseudonymer. Ett konferens papper, som presenterar protokollet och resultatet av denna avhandling, har blivit accepterat till IEEE Vehicular Networking Conference i Torino, Italien, 27-29 November 2017 [1].
Jacob, Jibin. "Pseudonymity in VANETS and its implications on the vehicular communication protocol stacks". Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119823.
Testo completoAichele, Fabian. "Realisierung und Evaluierung von Trust-Update-Algorithmen für das UniTEC Reputationssystem". [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11144230.
Testo completoTang, Fugui. "A proximity determinable social pseudonym framework in online identity management system". Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=107858.
Testo completoDans le contexte d'Internet, les identifiants des usagers jouent un rôle critique. L'un des avantages des identifiants traditionnels, soient les pseudonymes, est de fournir une protection de la vie privée des usagers. Les usagers peuvent créer autant d'identifiants anonymes qu'ils le désirent simplement en utilisant une adresse courriel. Par contre, l'anonymité même peut devenir un facteur limitant dû à la déresponsabilisation des usagers. L'importance des réseaux sociaux en ligne nous inspire à créer un système de pseudonymes sociaux à travers lequel il sera possible de déterminer la proximité entre pseudonymes tout en conservant la confidentialité. Le système se base sur l'idée d'associer un réseau social à un espace géométrique et d'assigner des coordonnées à chaque usager qui dépendent de la relation entre l'usager et son voisinage. Les coordonnées elles-même ne fournissent aucune information confidentielle à propos d'un usager. Cependant, en calculant la distance entre différentes coordonnées, la proximité entre usagers peut être estimée avec une certaine probabilité. J'ai évalué le système avec des données provenant de réseaux sociaux réels. Les résultats indiquent que le système proposé, en imposant certaines conditions, est prometteur.
Ernstzen, Cedrine Veanca. "Regulating a pseudonym: Namibia's regulatory response to cross-border Cryptocurrency transactions". Master's thesis, Faculty of Law, 2021. http://hdl.handle.net/11427/32706.
Testo completoNikkila, Sonja Renee. "Pseudonymity, authorship, selfhood : the names and lives of Charlotte Brontë and George Eliot". Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/17556.
Testo completoKhodaei, Mohammad. "Secure Vehicular Communication Systems: Design and Implementation of a Vehicular PKI (VPKI)". Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119820.
Testo completoXu, Yijia. "Resisting whitewashing: a comparative study of fixed identity, pseudonym, and social identity". Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106546.
Testo completoLe sens du mot "identité" s'élargit dans le contexte d'Internet. Dans la vraie vie, sauf dans des cas très particuliers, nous avons une identité fixe. Très tôt sur Internet, on a eu recours aux pseudonymes pour identifier les usagers. Avec l'évolution des réseaux sociaux est venue l'identité sociale ("social identity" en Anglais). Bien qu'elle représente le mode d'identité le plus sécuritaire, l'identité fixe impose des limites importantes qui la rendent difficile d'utilisation sur Internet. Parmi les trois modes d'identité, le pseudonyme est le plus facile à créer, mais il permet aussi aux usagers malveillants de facilement abuser de la confiance des autres. Suite aux actes malhonnêtes (arnaques ou non respect des règles établies, par exemple), un usager malveillant peut changer de pseudonyme pour blanchir son identité ("whitewashing" en anglais). Il disparaît donc du réseau pendant un certain temps pour réapparaitre plus tard sous une nouvelle identité aucunement liée à l'ancienne. L'identité sociale diffère de l'identité fixe et des pseudonymes en se basant sur les relations entre deux personnes tout en protégeant la vie privée de l'utilisateur et la sécurité de l'organisation.Cette thèse analyse les effets du blanchissage selon le mode d'identité utilisé et compare les différents comportements de résistance au blanchissage. La théorie des jeux est utilisée pour modéliser le blanchissage et calculer son effet sur la population pour chaque mode d'identité utilisé. Dans la majorité des cas, l'identité sociale est plus apte à éliminer les blanchisseurs. Des simulations Matlab révèlent aussi des faits intéressants au sujet des trois modes d'identité qui pourraient aider à l'élaboration de futurs systèmes de gestion d'identité.
Ascárate, Luz. "The Pseudonymes of an Exception or to Philosophize after Kierkegaard, according to Paul Ricoeur". Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/119530.
Testo completoPaul Ricoeur, lector de paradojas, interpreta la filosofía kierkegaardiana de forma paradójica en dos sentidos. El primer sentido hace referencia a aquella paradoja en el exterior de su filosofía y está representada por sus pseudónimos. Desde este punto de vista, Kierkegaard, el existente, es la excepción de sus pseudónimos y, con ello, representa la paradójica relación de todo filosofar con la existencia particular que es el filósofo, existencia que representa la no-filosofía fuente de todo filosofar. El segundo sentido apunta al interior de su filosofía, en tanto sus desarrollos conceptuales representan el inacabamiento del sistema filosófico al tratar la temática del mal como enigma irresoluble que se tematiza en el centro de la existencia como angustia y desesperación. A partir de esta lectura, formulamos la pregunta ¿en qué consiste filosofar después de Kierkegaard? y respondemos: consiste en filosofar más allá de la filosofía misma: a partir y con la existencia que nutre el filosofar, propiciando el tratamiento irresoluble del proceder filosófico.
Grenabo, Erik. "Kanske en riktig författare : Om Foucaults författarfunktion, pseudonymer och omvärderingar rörande Göran Tunströms Hallonfallet". Thesis, Karlstads universitet, Institutionen för språk, litteratur och interkultur, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-55010.
Testo completoBulgarelli, Juliana. "Les représentations de la modernité brésilienne dans l'oeuvre de Paulo Barreto et ses pseudonymes". Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCA111/document.
Testo completoDuring the end of the nineteenth century and the first decades of the twentieth, the city of Rio de Janeiro went through a series of socio-economic changes related to the process of the implementation of modernity and the consolidation of capitalism in Brazil. In this moment, local authorities, along with the elite of the country, created a modernization project whose goal was to eliminate the remaining aspects of the colonial period still present in the city, making it more similar to European capitals through urban reforms. These modifications expressed the desire for progress and civilization from the dominant Brazilian classes while also attempted to follow the example and the rhythm of social, cultural and economic development of Europe. In this context, the authorities from Rio de Janeiro imposed a transformation of habits and popular traditions with the purpose of ending the old customs from the colonial past and the elements of the popular culture that were considered primitive and barbaric. It was in this moment of great changes that Paulo Barreto wrote his work and created several characters. In his texts, he documented and pondered on the urbanization process and the transformations executed to the city of Rio de Janeiro, paying special attention to the alterations that this process caused to the population and its customs, interactions and sociability. Barreto‘s work reflects the impositions of a government concerned with the idea of civilizing the city and the life of its inhabitants in contrast with the reality of the daily life of that population. Through a close observation of the city in all its spheres and its quotidian life, he constructed relevant interpretations about the dynamics and the characteristics of modern life, as well as different representations of modernity. In this sense, this present research intends to analyse the representations of modernity constructed by Paulo Barreto throughout this work
Durante o final do século XIX e as duas primeiras décadas do século XX, a cidade do Rio de Janeiro viveu uma série de transformações socioeconômicas associadas ao processo de implantação da modernidade e de consolidação do capitalismo no Brasil. Nesse momento, as autoridades cariocas, aliadas à elite do país, criaram um projeto de modernização que visava, através de reformas urbanas, acabar com as características coloniais da cidade aproximando-a das grandes capitais européias. Essas reformas expressavam o desejo de progresso e de civilização das classes dominantes brasileiras ao mesmo tempo em que correspondiam a uma tentativa do Brasil em seguir os modelos e os ritmos de desenvolvimento social, cultural e econômico dos países europeus. Nesse contexto, as autoridades cariocas impuseram também uma transformação nos costumes, nos hábitos e nas tradições da população com o objetivo de acabar com as antigas tradições coloniais e com os elementos da cultura popular considerados como marca do primitivismo e da barbárie. É nessa época e nesse contexto de intensas mudanças que Paulo Barreto escreveu suas obras e criou seus inúmeros personagens. Nos seus textos, ele documenta e faz uma reflexão sobre o processo de urbanização e as mudanças sofridas pela cidade do Rio de Janeiro, prestando atenção nas transformações que esse processo provocou na população, seus costumes, suas interações e sua sociabilidade. Sua obra reflete as imposições de um governo preocupado em civilizar a cidade e a vida de seus cidadãos em contraste com a realidade do cotidiano da população. A partir de uma observação atenta da cidade em todas suas esferas e todas as situações possíveis do cotidiano de seus habitantes, ele construiu importantes interpretações sobre a dinâmica e as características da vida moderna, assim que diferentes representações da modernidade. Deste modo, esse trabalho de pesquisa tem como objetivo determinar as representações da modernidade brasileira construídas por Paulo Barreto no conjunto da sua obra
Hannah, Heather. "Male use of a female pseudonym in nineteenth-century British and American literature". Thesis, Hannah, Heather (2018) Male use of a female pseudonym in nineteenth-century British and American literature. PhD thesis, Murdoch University, 2018. https://researchrepository.murdoch.edu.au/id/eprint/44781/.
Testo completoMoncion, Isabelle. "Antoine Volodine et ses hétéronymes, ou comment constituer à soi seul une communauté d'écrivains". Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/31990.
Testo completoLaslier, Pierre-François. "Réseaux sociaux numériques et responsabilité pénale". Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0119.
Testo completoSpearheading the democratization of online speech, social networks have undoubtedly revolutionized our informational landscape by offering everyone the opportunity to express themselves and connect with others. Bearers of hope, these platforms have also contributed to the emergence of new forms of infringement that criminal law could not ignore. Digital raids, hate speech, sexual offences, deceit and offences to the personality, are some of the unlawful acts that are amplified by social networks, and that ultimately justify resorting to criminal law. The thesis delves into the relationship between this punitive branch of the law and social networks, and, more precisely, measures the impact of these online services on the conditions of criminal liability. Far from turning criminal liability upside down, the features of social networks spur a renewal of this repressive mechanism. On the one hand, the contours of the offences need to be renewed in order to embrace the interactive and intrusive dimensions of social networks. As a result, many offenses have to be confronted with these new communication media, such as press offences, sexual offenses, offenses against consent or offenses against privacy or identity. On the other hand, the specific functioning of these online services calls for a renewal of the rules relating to the repression lato sensu. Regarding social networks users, their repressive regime needs to be adapted to take the interactive nature of these media into account. Thus, the rules of attribution and punishment of the offenses have to be adjusted. Regarding platform managers, the growing awareness of their active role in the circulation of contents calls for a deepening of their repressive regime, in order to force them to anticipate the occurrence of offenses risks
Emanuelsson, Sofia. ""HEN är bara en pseudonym för fega butches" : Konstruktioner av kön i debatten om hen". Thesis, Uppsala universitet, Institutionen för nordiska språk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-192358.
Testo completoSalbato, Jeffrey Charles. "Interpreting Kierkegaard's major religious pseudonyms reading Fear and trembling, Philosophical fragments, and the Concluding unscientific postscript /". Theological Research Exchange Network (TREN), 1995. http://www.tren.com.
Testo completoNordbeck, Sebastian. "Vem vill inte vara sig själv En essä om alter egon av Sebastian Nordbeck". Thesis, Kungl. Konsthögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kkh:diva-209.
Testo completoMarden, Michael Patrick Pasley Jeffrey L. "Concealed authorship on the eve of the revolution pseudonymity and the American periodical public sphere, 1766-1776 /". Diss., Columbia, Mo. : University of Missouri--Columbia, 2009. http://hdl.handle.net/10355/6477.
Testo completoPilon, Simone. "Constitution du corpus des écrits des femmes dans la presse canadienne-française entre 1883 et 1893 et analyse de l'usage des pseudonymes". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0016/NQ48549.pdf.
Testo completoLafond, Hélène. "L'univers romanesque d'Émile Ajar ou Le refus de la norme". Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60626.
Testo completoRuby, Michael [Verfasser]. "Magnetic Impurities on a Superconductor: from Single Atoms to Coupled Chains / Michael Kleinert unter dem offiziellen Pseudonym Michael RUBY". Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1136319360/34.
Testo completoPlewtong, Nicholas. "Modeling Adversarial Insider Vehicles in Mix Zones". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1810.
Testo completoLee, Min-Ho. "Socrate dans l'œuvre de kierkegaard : l'examen de la conception kierkegaardienne de Socrate dans la thèse universitaire et l'œuvre pseudonyme de Kierkegaard". Paris 1, 2001. http://www.theses.fr/2001PA010502.
Testo completoMartin, Marcienne. "Les constructions identitaires du sujet à travers la mise en place de pseudonymes et l'émergence d'un nouveau code langagier via l'outil Internet". Phd thesis, Université de la Réunion, 2005. http://tel.archives-ouvertes.fr/tel-00484359.
Testo completoJorge, Manuel dos Santos. "Fernando Pessoa : identités et hétéronymes". Paris 7, 1994. http://www.theses.fr/1994PA070123.
Testo completoThe four heteronyms of the portuguese poet, Fernando Pessoa import, as to the freudian theory of identification, the hypostasis of each identification axial form. Pessoa call from the old construction of ego, a few (four) refused imago for his work completion and his personal unity promotion like a subject one
Hadouche, Dris Leïla Louise. "La construction de soi dans l'écriture littéraire. Le cas d'Isabelle Eberhardt". Paris 8, 2010. http://octaviana.fr/document/156366126#?c=0&m=0&s=0&cv=0.
Testo completoThe place and the importance of the writing construction in analysis are no longer to be demonstrated. Freud is one of the firsts to make allusion in Construction et analyse. But what is it when one of the steps of self writing is done by self writing as another; in other words, by intermediary pseudonyme? How can writing correct desableted identity and the suffering to be ? How can it fullfill in father absence and correct the mother relation défined as being pathologic? These are the raised questions in this research. To answer it and enrich the psychanalitic reflexion in relation to the self writing, we will be interestd in Isabelle Eberhardt’s diary, correspondences and a part of her short stories
Abbott, Reed S. "CPG : closed pseudonymous groups /". Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2292.pdf.
Testo completoScheider, Frédéric. "Le roman familial de gary/ajar : une illustration litteraire du clivage". Lyon 1, 1992. http://www.theses.fr/1992LYO1M017.
Testo completoOliveira, Ranis Fonseca de. "A comunicação existencial na filosofia de Søren Aabye Kierkegaard". Pontifícia Universidade Católica de São Paulo, 2014. https://tede2.pucsp.br/handle/handle/11671.
Testo completoCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
This thesis proposes to examine as a mainstay in the theoretical literature and the existential philosophy of communication Søren Aabye Kierkegaard (1813-1855). The author's existential communication is understood as communication of reflection, which addresses the individual and not the mass. Accordingly, this communication is done indirectly and justified in interpreting that existence is too contradictory to be considered and appraised objectively. The existential communication is the feature that the Danish thinker developed to position himself in front of Christendom, this is, the trivialization of real Christianity. For this, we used irony and pseudonymity
A presente tese propõe-se a analisar, com esteio em pesquisa teórica e bibliográfica, a comunicação existencial na filosofia de Søren Aabye Kierkegaard (1.813 1.855). A comunicação existencial do autor é compreendida como comunicação de reflexão, que se dirige ao Indivíduo e não à massa. Nesse sentido, tal comunicação é realizada indiretamente e justifica-se na interpretação de que a existência é muito contraditória para ser pensada e conceituada objetivamente. A comunicação existencial é o recurso que o pensador dinamarquês desenvolveu para posicionar-se diante da filosofia do Sistema, como também diante da cristandade, isto é, da banalização do verdadeiro cristianismo. Para tanto, utilizou-se da ironia e da pseudonímia
Nestelbaum-Guez, Maya. "Le cri de la judéïté et de la Shoah dans l'œuvre littéraire de Romain Gary". Paris 8, 2011. http://www.theses.fr/2011PA083415.
Testo completoMartucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks". Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.
Testo completoAndersson, Christer. "Enhancing Privacy for Mobile Networks : Examples of Anonymity Solutions and Their Analysis". Licentiate thesis, Karlstad University, Division for Information Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-1560.
Testo completoInternet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.
One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.
This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation
and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc
networks, a required building block for ambient intelligence.
Quenneville-Labelle, Frédéric. "Madeleine à La Revue moderne : une approche sociopoétique (1919-1923)". Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25580.
Testo completoAtif, Ayub, e Justin Arieltan. "Secure and Privacypreserving V2X multicast DNS". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281396.
Testo completoDomännamnssystemet är en hierarkisk benämningssystem som ger information om nätverksresurser eller tjänster för givna domännamn. DNS application i fordon nätverk framkallar nya utmaningar när det handlar om datasäkerhet och fordons integritet. Det är särskilt fordon kommunikation utanför vägkant-infrastrukturens räckvidd som behöver bevara och försäkra operationer av DNS applikation i fordon nätverk. Multicast DNS är en föreslagen metod för att begränsa förfrågan till fordon i en fordon-till-all-miljö som kan inkludera andra anslutna enheter. Nuvarande applikationer förlitar sig på en robust säkerhetsprotokoll som kommer från DNS säkerhetsförlängning för att autentisera svar och verifiera resurs rekord. Fordon DNS kommunikationer behöver autentisering för att verifiera källor och legitimitet av DNS resurs rekord. Detta kan uppnås genom multihop fordon-till-fordon kommunikation för att ansluta sig till en namn server med hjälp av en ny metod för att verifiera uppgifter med hjälp av bloomfilter datastruktur.I tesen analyserar vi risken som finns i en icke-autentiserad integritets-läckande kommunikationsprotokoll. Vi bygger sedan ett nätverk och använder en pseudonym certifikatbaserad publik nyckel infrastruktur lösning för att undersöka förbättringar inom säkerhet och integritet. Analysen från experimenten visar att det finns en förbättring för säkerhet och integritet i utbyte mot tidsprestanda, vilket är en intressant kompromiss.
Ma, Yingying. "Impact of social media use on political participation : narcissism, perceived anonymity and social norms as mediators". HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/677.
Testo completoNoroozi, Hamid. "A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300658.
Testo completoAnsträngningar för standardisering av Vehicular Communication Systems har varit avgörande för användandet av Vehicular Public-Key Infrastructure (VPKI) för att etablera förtroende mellan nätverksdeltagare. Användande av VPKI i Vehicular Communication (VC) garanterar integritet och autenticitet av meddelanden. Det erbjuder ett lager av säkerhet för fordon då VPKI ger dem en mängd av icke länkbara certifikat, kallade pseudonym, som används medan de kommunicerar med andra fordon, kallat Vehicle-to-Vehicle (V2V) eller Roadside Units (RSUs) kallat Vehicle-to-Infrastructure (V2I). Varje fordon använder ett pseudonym under en begränsad tid och genom att byta till ett icke tidigare använt pseudonym kan det fortsätta kommunicera utan att riskera sin integritet. I litteratur har två metoder föreslagits för hur man ska ladda fordon med pseudonym de behöver. Den ena metoden det så kallade offline-läget, som proponerar att man för-laddar fordonen med alla pseudonym som det behöver vilket ökar kostnaden för revokering i fall de blir komprometterat. Den andra metoden föreslår ett on-demand tillvägagångssätt som erbjuder pseudonym via VPKI på fordonets begäran vid början av varje färd. Valet av på begäran metoden sätter en stor börda på tillgänglighet och motståndskraft av VPKI tjänster. I det här arbetet, möter vi problem med storskaliga driftsättningar av en på begäran VPKI som är motståndskraftig, har hög tillgänglighet och dynamiskt skalbarhet i syfte att uppnå dessa attribut genom att nyttja toppmoderna verktyg och designparadigmer. Vi har förbättrat ett VPKI system för att säkerställa att det är kapabelt att möta SLA:er av företagsklass gällande tillgänglighet och att det även kan vara kostnadseffektivt eftersom tjänster dynamiskt kan skala ut vid högre last eller skala ner vid lägre last. Detta har möjliggjorts genom att arkitekta om en existerande VPKI till en cloud-native lösning driftsatt som mikrotjänster. En av nyckelutmaningarna till att ha en pålitlig arkitektur baserad på distribuerade mikrotjänster är sybil-baserad missuppförande. Genom att utnyttja Sybil baserade attacker på VPKI, kan illvilliga fordon påverka trafik att tjäna dess egna syften. Därför är det av största vikt att förhindra Sybil attacker. Å andra sidan så dras traditionella metoder att stoppa dem med prestandakostnader. Vi föreslår en lösning för att adressera Sybilbaserade attacker genom att nyttja Redis, en in-memory data-store utan att märkbart kompromissa på systemets effektivitet och prestanda. Att köra våra VPKI tjänster på Google Cloud Platform (GCP) och genomföra diverse stresstester mot dessa har visat att storskaliga driftsättningar av VPKI as a Service (VPKIaaS) kan göras effektivt samtidigt som riktigt trafik hanteras. Vi har testat VPKIaaS under syntetisk genererat normalt trafikflöde samt flow och flash mängd scenarier. Det har visat sig att VPKIaaS klarar att utfärda 100 pseudonym per förfråga utsänt av 1000 fordon (där fordonen bad om en ny uppsättning pseudonym varje 1 till 5 sekunder), och varje fordon fått svar inom 77 millisekunder. Vi demonstrerar även att under en flashcrowd situation, där antalet fordon höjs till 50000 med en kläckningsgrad på 100. VPKIaaS dynamiskt skalar ut och tar ≈192 millisekunder att betjäna 100 pseudonymer per förfrågan gjord av fordon.
Mongoin, David. "La doctrine constitutionnelle du Federaliste : La question d'institutions libérales après le régime mixte". Paris 2, 2007. http://www.theses.fr/2007PA020082.
Testo completo