Gotowa bibliografia na temat „Pseudonymat”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Pseudonymat”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Pseudonymat"
Brunet, Manon. "Travestissement littéraire et trajectoire intellectuelle d’Henri-Raymond Casgrain". Dossier 30, nr 1 (21.01.2005): 47–66. http://dx.doi.org/10.7202/009888ar.
Pełny tekst źródłaBrunet, Manon. "Anonymat et pseudonymat au XIX siècle : l’envers et l’endroit de pratiques institutionnelles". Voix et Images 14, nr 2 (1989): 168. http://dx.doi.org/10.7202/200767ar.
Pełny tekst źródłaHardy, Stéphane. "Analyse onomastique des pseudonymes de prostituées parisiennes du XVIIIe au début du XXe siècle". Acta Universitatis Lodziensis. Folia Litteraria Romanica, nr 16 (19.05.2021): 183–94. http://dx.doi.org/10.18778/1505-9065.16.17.
Pełny tekst źródłaXin Xin, Tianhan Gao i Xinyang Deng. "Location privacy protection scheme based on self-organizing cryptographic mix-zone in VANETs". Research Briefs on Information and Communication Technology Evolution 4 (15.09.2018): 107–13. http://dx.doi.org/10.56801/rebicte.v4i.71.
Pełny tekst źródłaBALDE, Amadou Woury. "Entre pseudonymat et anonymat dans l'œuvre de Charles Sorel : pratique et pensée de la dissimulation". Écho des études romanes 13, nr 2 (11.12.2017): 227–37. http://dx.doi.org/10.32725/eer.2017.033.
Pełny tekst źródłaHébert, Pierre. "L’homme derrière une vitre". Dossier 30, nr 1 (21.01.2005): 81–92. http://dx.doi.org/10.7202/009890ar.
Pełny tekst źródłaYang, Min, Yong Feng, Xiaodong Fu i Qian Qian. "Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles". International Journal of Distributed Sensor Networks 15, nr 7 (lipiec 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865508.
Pełny tekst źródłaZakharova, Olga. "Fyodor Dostoevsky’s Pseudonyms. Insertion by F. M. Dostoevsky in the Feuilleton by N. N. Strakhov". Неизвестный Достоевский 8, nr 1 (marzec 2021): 21–41. http://dx.doi.org/10.15393/j10.art.2021.5221.
Pełny tekst źródłaPallagi, Anna Liza. "Álnevek bűvöletében". Névtani Értesítő 42 (2020): 199–212. http://dx.doi.org/10.29178/nevtert.2020.12.
Pełny tekst źródłaHong-ying, Zhang. "RUSSIAN PSEUDONYM IN THE BACKGROUND OF CHINESE CULTURE". Humanities And Social Studies In The Far East 18, nr 1 (2021): 97–102. http://dx.doi.org/10.31079/1992-2868-2021-18-1-97-102.
Pełny tekst źródłaRozprawy doktorskie na temat "Pseudonymat"
Luneau, Marie-Pier. "Les Lionel Groulx : la pseudonymie comme stratégie littéraire et jeu institutionnel (1900-1966)". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1996. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21797.pdf.
Pełny tekst źródłaOmari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music". Universitätsbibliothek Leipzig, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-90542.
Pełny tekst źródłaMollaret, Damien. "Le détour par l'autre : plurilinguisme et pseudonymie dans les oeuvres de Fernando Pessoa, Vladimir Nabokov, Jorge Luis Borges et Romain Gary". Thesis, Bordeaux 3, 2019. http://www.theses.fr/2019BOR30026.
Pełny tekst źródła“I cannot stand my real name, I feel immediately stuck” says the narrator of Pseudo, a Romain Gary novel authored under his pseudonym, Émile Ajar. He adds that he “has attempted everything to run away from [himself]”. He tried specially to learn different languages and even to invent his own. Like Gary other writers have considered their mother tongue or their surname as restraints limiting their possibilities. In order to “feel everything in every way” (Pessoa’s expression) they would change their language or use pseudonyms. To jointly study multilingualism and the use of pseudonyms, we focused on four 20th century authors: the Portuguese poet Fernando Pessoa (1888-1935), the Russian-American novelist Vladimir Nabokov (1899-1977), the Argentinian writer Jorge Luis Borges (1899-1986) and the French novelist Romain Gary (1914-1980). The writings of all four authors are at the intersection of several languages and cultures. In addition to their mother tongue, they each mastered French and English. They used English as a second language for their writing, were translators and/or self-translators. Additionally, all four took pseudonyms and invented fictitious alter egos. Pessoa’s concept of heteronym (closely connected to his multilingualism) allowed us to shed light on the work of the three other authors. To do this, we compared Pessoa’s main heteronyms with those of Bustos Domecq (pseudonym of Borges and Bioy Casares), Emile Ajar (pseudonym of Gary, embodied as the straw man Paul Pavlowitch) and Sirine (Nabokov’s Russian alter ego). Like translation, heteronymous writing requires some depersonalization. And like self-translation, it forces the author to confront an alter ego. To write in another language or to invent a new style in one’s own language, one must renounce a part of one’s self. This thesis aims to show that for these authors using pseudonyms and writing in different languages represents less of a rejection of their identities than an indirect way to come back to themselves. Freed from themselves by their heteronyms, they can better appreciate who they are, be self-critical and thus they can open their hearts to their readers. Writing in a second language also creates a certain distance that enables them to confess and experiment
Lysyanskaya, Anna. "Pseudonym systems". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80544.
Pełny tekst źródłaBar-Kochva, Sharon. "Les pseudonymes dans les littératures yiddish et hébraïque du milieu du XIXe siècle au milieu du XXe siècle". Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCF001.
Pełny tekst źródłaModern Yiddish and Hebrew literatures are closely connected by a common long history, sharing many stylistic and thematic features. However, both literatures significantly differ in their use of pseudonyms. In Yiddish literature, authors’ pseudonyms appear rather frequently, and a significant number of the most important writers are known mainly in their pseudonyms, while in modern Hebrew literature pen names remained a relatively marginal occurrence. This research analyses pseudonymity in both literatures in order to explain this discrepancy. In the first chapter, the various patterns used in building pseudonyms are analysed, so to establish a general typology of the phenomenon. Subsequently, I focus on the "lasting" pseudonyms, namely those that accompany authors for a long time, shaping and determining their public image. In the second chapter I describe in detail under which circumstances and in what ways the "lasting" pseudonyms were created and used. Finally, in the last part the information analysed previously is utilised, clarifying that pseudonymity is actually a social phenomenon, and defining the social and historical factors that led to the adoption of pseudonymity as one of the "invented traditions" of modern Yiddish literature
Omari, Shani. "Call me ‘Top in Dar’ : the role of pseudonyms in Bongo Fleva music". Swahili Forum 18 (2011), S. 69-86, 2011. https://ul.qucosa.de/id/qucosa%3A11465.
Pełny tekst źródłaWilder, Terry L. "New Testament pseudonymity and deception". Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU099071.
Pełny tekst źródłaYarygina, Tatiana. "Women's Pseudonyms in Russian Modernism". Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18349.
Pełny tekst źródłaYieh, Pierson. "Vehicle Pseudonym Association Attack Model". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.
Pełny tekst źródłaBenin, Joseph Thomas. "Unified distribution of pseudonyms in hybrid ephemeral vehicular networks". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45910.
Pełny tekst źródłaKsiążki na temat "Pseudonymat"
Eymer, Wilfrid. Eymers Pseudonymen Lexikon: Realnamen und Pseudonyme in der deutschen Literatur. Bonn: Kirschbaum, 1997.
Znajdź pełny tekst źródłaRoom, Adrian. A dictionary of pseudonyms and their origins, with stories of name changes. Jefferson, N.C: McFarland, 1989.
Znajdź pełny tekst źródłaauthor, Savage Diana 1950, red. Pseudonym. New Kensington, PA: Whitaker House, 2016.
Znajdź pełny tekst źródłaRoom, Adrian. Dictionary of pseudonyms. Wyd. 3. Jefferson, N.C: McFarland, 1998.
Znajdź pełny tekst źródłaRoom, Adrian. Dictionary of pseudonyms. Wyd. 3. Jefferson, N.C: McFarland, 1998.
Znajdź pełny tekst źródłaRatier, Emmanuel. Encyclopédie des pseudonymes. Paris: Faits & documents, 1993.
Znajdź pełny tekst źródłaDunaway, Taylor Welford, red. The Newsprint mask: The tradition of the fictional journalist in America. Ames: Iowa State University Press, 1991.
Znajdź pełny tekst źródłaOelschlegel, Axel. Das Pseudonym: Roman. Halle: Mitteldt. vlg., 1988.
Znajdź pełny tekst źródłaOelschlegel, Axel. Das Pseudonym: Roman. Halle: Mitteldeutscher Verlag, 1988.
Znajdź pełny tekst źródłaHawk, Pat. Hawk's authors' pseudonyms II: A comprehensive reference of modern author's pseudonyms. Wyd. 2. [Southlake, TX: P. Hawk], 1995.
Znajdź pełny tekst źródłaCzęści książek na temat "Pseudonymat"
Fischer-Hübner, Simone. "Pseudonymity". W Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_1490-3.
Pełny tekst źródłaFischer-Hübner, Simone. "Pseudonymity". W Encyclopedia of Database Systems, 2207. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1490.
Pełny tekst źródłaFischer-Hübner, Simone. "Pseudonymity". W Encyclopedia of Database Systems, 2932–33. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1490.
Pełny tekst źródłaBleumer, Gerrit. "Pseudonyms". W Encyclopedia of Cryptography and Security, 992–94. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_216.
Pełny tekst źródłaSolanas, Agusti. "Pseudonyms". W Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1755-1.
Pełny tekst źródłaSellers, M. N. S. "Republican Pseudonyms". W American Republicanism, 8–10. London: Palgrave Macmillan UK, 1994. http://dx.doi.org/10.1007/978-1-349-13347-5_2.
Pełny tekst źródłaLysyanskaya, Anna, Ronald L. Rivest, Amit Sahai i Stefan Wolf. "Pseudonym Systems". W Selected Areas in Cryptography, 184–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46513-8_14.
Pełny tekst źródłaChen, Lidong. "Access with pseudonyms". W Cryptography: Policy and Algorithms, 232–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0032362.
Pełny tekst źródłaGabel, Alexander, i Ina Schiering. "Privacy Patterns for Pseudonymity". W Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 155–72. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16744-8_11.
Pełny tekst źródłaSobirey, Michael. "Grundlagen des pseudonymen Audit". W Datenschutzorientiertes Intrusion Detection, 62–75. Wiesbaden: Vieweg+Teubner Verlag, 1999. http://dx.doi.org/10.1007/978-3-322-86850-3_6.
Pełny tekst źródłaStreszczenia konferencji na temat "Pseudonymat"
Zoccoli, Giovanni Gambigliani, Dario Stabili i Mirco Marchetti. "Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario". W 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall). IEEE, 2023. http://dx.doi.org/10.1109/vtc2023-fall60731.2023.10333561.
Pełny tekst źródłaDalton, Ben. "Pseudonymity in social machines". W the 22nd International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487788.2488076.
Pełny tekst źródłaMa, Zhendong, Frank Kargl i Michael Weber. "Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications". W 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.455.
Pełny tekst źródłaSong, Boyeon, i Chris J. Mitchell. "Scalable RFID Pseudonym Protocol". W 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.15.
Pełny tekst źródłaBorcea-Pfitzmann, Katrin, Elke Franz i Andreas Pfitzmann. "Usable presentation of secure pseudonyms". W the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102486.1102498.
Pełny tekst źródłaMartucci, Leonardo A., Markulf Kohlweiss, Christer Andersson i Andriy Panchenko. "Self-certified Sybil-free pseudonyms". W the first ACM conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1352533.1352558.
Pełny tekst źródłaHan, Seungyeop, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy i David Wetherall. "Expressive privacy control with pseudonyms". W SIGCOMM'13: ACM SIGCOMM 2013 Conference. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2486001.2486032.
Pełny tekst źródłaPélissier, Samuel, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca i Didier Donsez. "Privacy-Preserving Pseudonyms for LoRaWAN". W WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3643833.3656120.
Pełny tekst źródłaBenin, Joseph, Michael Nowatkowski i Henry Owen. "Unified pseudonym distribution in VANETs". W 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2010. http://dx.doi.org/10.1109/wimob.2010.5645015.
Pełny tekst źródłaDang, Xiaojun, i Yang Zhang. "Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks". W 2008 The Fourth International Conference on Wireless and Mobile Communications. IEEE, 2008. http://dx.doi.org/10.1109/icwmc.2008.19.
Pełny tekst źródłaRaporty organizacyjne na temat "Pseudonymat"
Würth, Stéphanie. SNSF Datastory - Emma – on her way to a professorship? Swiss National Science Foundation, maj 2021. http://dx.doi.org/10.46446/datastory.emma-on-her-way-to-a-professorship.
Pełny tekst źródłaPignataro, C., J. Clarke i G. Salgueiro. Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS). RFC Editor, kwiecień 2012. http://dx.doi.org/10.17487/rfc6593.
Pełny tekst źródła