Artigos de revistas sobre o tema "Pseudonymat"

Siga este link para ver outros tipos de publicações sobre o tema: Pseudonymat.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Pseudonymat".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Brunet, Manon. "Travestissement littéraire et trajectoire intellectuelle d’Henri-Raymond Casgrain". Dossier 30, n.º 1 (21 de janeiro de 2005): 47–66. http://dx.doi.org/10.7202/009888ar.

Texto completo da fonte
Resumo:
Résumé L’anonymat et le pseudonymat, pratiques très courantes au dix-neuvième siècle, obstruent l’accès à l’oeuvre entier d’un écrivain. Les oeuvres complètes créées par l’auteur sont, de surcroît, incomplètes. Ces formes d’autocensure se multiplient jusqu’à la mort. Ensuite, si des archives le permettent, l’oeuvre peut être complété. Des prises de position esthétiques et idéologiques dévoilées confrontent la première décantation de l’Oeuvre. Les albums annotés par Casgrain de coupures de presse des articles anonymes et pseudonymes constituent une source rare en histoire littéraire. Grâce à eux, l’auteur signe et persiste.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Brunet, Manon. "Anonymat et pseudonymat au XIX siècle : l’envers et l’endroit de pratiques institutionnelles". Voix et Images 14, n.º 2 (1989): 168. http://dx.doi.org/10.7202/200767ar.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hardy, Stéphane. "Analyse onomastique des pseudonymes de prostituées parisiennes du XVIIIe au début du XXe siècle". Acta Universitatis Lodziensis. Folia Litteraria Romanica, n.º 16 (19 de maio de 2021): 183–94. http://dx.doi.org/10.18778/1505-9065.16.17.

Texto completo da fonte
Resumo:
Le présent article s’inscrit dans le contexte des recherches scientifiques dédiées à l’onomastique, plus particulièrement aux études sur l’anthroponymie, voire sur la pseudonymie, et répond au besoin actuel d’analyses onomastiques en romanistique. L’usage du pseudonyme a longtemps été considéré comme une pratique marginale, et, de ce fait, a été peu étudié jusqu’à présent. Nous avons soumis à notre analyse un corpus de pseudonymes de prostituées exerçant leur métier à Paris. Ce corpus regroupe 357 pseudonymes et couvre une période comprise entre le XVIIIe siècle et le début du XXe siècle. Les données ont été recueillies dans des rapports de police (travail dans le cadre d’archives) ainsi que dans des ouvrages sociologiques traitant de la prostitution parisienne aux XVIIIe et XIXe siècles. Selon plusieurs critères, à savoir morphosyntaxiques et sémantiques, nous tenterons d’appliquer aux pseudonymes de prostituées une taxonomie développée précédemment distinguant plusieurs types de procédés de formation des pseudonymes de criminels allemands au XIXe siècle.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Xin Xin, Tianhan Gao e Xinyang Deng. "Location privacy protection scheme based on self-organizing cryptographic mix-zone in VANETs". Research Briefs on Information and Communication Technology Evolution 4 (15 de setembro de 2018): 107–13. http://dx.doi.org/10.56801/rebicte.v4i.71.

Texto completo da fonte
Resumo:
How to ensure the location privacy of vehicles has become an important security issue of VANETS.One of the effective mechanisms to protect the vehicles’ location privacy is replacing the pseudonymto achieve unlinkability with the help of road side unit (RSU). This paper takes the scenario into accountwhere RSUs have not yet been deployed widely. When a vehicle wants to change pseudonym,it transmits group keys in a collaborative manner and creates encrypted areas with surrounding vehicles.At this point, the external attackers cannot crack any information in this area, the cryptographicmix-zone. During this period, some vehicles will be replaced with new pseudonyms. The externalattackers are not able to associate the pseudonyms with the old ones to achieve the goal of locationprivacy protection of the vehicles.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

BALDE, Amadou Woury. "Entre pseudonymat et anonymat dans l'œuvre de Charles Sorel : pratique et pensée de la dissimulation". Écho des études romanes 13, n.º 2 (11 de dezembro de 2017): 227–37. http://dx.doi.org/10.32725/eer.2017.033.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Hébert, Pierre. "L’homme derrière une vitre". Dossier 30, n.º 1 (21 de janeiro de 2005): 81–92. http://dx.doi.org/10.7202/009890ar.

Texto completo da fonte
Resumo:
Résumé L’un des paradoxes les plus remarquables chez Louis Dantin est que ce critique et auteur détestait les différends et que, néanmoins, il n’est à peu près pas une de ses oeuvres qui n’ait choqué les lecteurs de son temps. Dantin se croyait presque fatalement incapable de ne rien écrire qui ne tournât à l’hétérodoxie… Le recours à l’anonymat et au pseudonymat pose donc ici un intéressant problème : quel est leur rôle à l’intérieur de la transgression ? Cet article pose que, dans les quatre étapes qui conduisent à l’acte transgressif selon George-Elia Sarfati, la signature fictive joue un rôle essentiel à partir de la troisième étape, créant une distinction nécessaire entre l’homme qui demeure en retrait et son délégué transgresseur, la figure auctoriale.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Yang, Min, Yong Feng, Xiaodong Fu e Qian Qian. "Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles". International Journal of Distributed Sensor Networks 15, n.º 7 (julho de 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865508.

Texto completo da fonte
Resumo:
In Internet of Vehicles, establishing swap zones in which vehicles can exchange pseudonyms is an effective method to enhance vehicles’ location privacy. In this article, we propose a new scheme based on dynamic pseudonym swap zone, to protect location privacy of vehicles. For each vehicle, dynamic pseudonym swap zone allows it dynamically to establish a temporary pseudonym swap zone on demand to exchange the pseudonym with another random vehicle in the just formed zone. This randomness of choosing the pseudonym exchanging vehicles prevents dynamic pseudonym swap zone from the secure risk that the information of exchanging participants exposes to their group manager in some existing works in which each pair of pseudonym exchanging participants is assigned by the manager. To avoid the high communication and computation overhead of frequently swapping pseudonyms, dynamic pseudonym swap zone adopts a combination of swap and update to achieve the unlinkability between new and previous pseudonyms. Moreover, dynamic pseudonym swap zone can self-adapt to the varying surroundings to reduce the communication cost of forming pseudonym swap zones in high vehicle density areas. The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Zakharova, Olga. "Fyodor Dostoevsky’s Pseudonyms. Insertion by F. M. Dostoevsky in the Feuilleton by N. N. Strakhov". Неизвестный Достоевский 8, n.º 1 (março de 2021): 21–41. http://dx.doi.org/10.15393/j10.art.2021.5221.

Texto completo da fonte
Resumo:
Identification of pseudonyms is one of the key tasks of attribution of many articles in the Vremya and Epokha magazines, and the Grazhdanin weekly. I. F. Masanov's article on Dostoevsky in the authoritative Dictionary of Pseudonyms contains errors and repetitions. Fyodor Dostoevsky signed his literary works with his personal name: Fyodor Dostoevsky, F. M. Dostoevsky, or, more often, F. Dostoevsky. On the contrary, the writer preferred to work as a journalist anonymously, more rarely — under pseudonyms. The range of Fyodor Dostoevsky's pseudonyms should be clarified. It is necessary to exclude “N. N.” from the list of pseudonyms, remove repeat “—y, M.” и “M. —y”, leave Dostoevsky's personal pseudonym “Zuboskalov” and add a new pseudonym “Ch. Komitetskiy”. The insert in the “Chronicler's notes” article is not the proper basis to make N. N. Strahov's pseudonym “Letopisets” (Epokha. 1865. № 1) a collective one or assign it to Dostoevsky. Most of Dostoevsky's pseudonyms are of an occasional nature, they are isolated and random. The names and surnames of real persons (M. Dostoevsky, A. Poretsky) in the role of his pseudonyms are accidental. As a result of critical analysis, it was established that in his literary and journalistic activities Dostoevsky used both regular (“F. D.”), (“D.”), (“Ed.”) and isolated pseudonyms “Zuboskal”, “Zuboskalov”, “N. N.”, “M. —y”, “Ch. Komitetskiy”, “Drug Kuzmy Prutkova” (“Friend of Kuzma Prutkov”). At this time, their range can be limited to this list. The appendix to the article contains an insert attributed to Dostoevsky in N. N. Strakhov's feuilleton «Notes of the Chronicler» from the January issue of the «Epoch» for 1865.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Pallagi, Anna Liza. "Álnevek bűvöletében". Névtani Értesítő 42 (2020): 199–212. http://dx.doi.org/10.29178/nevtert.2020.12.

Texto completo da fonte
Resumo:
The examination of literary pseudonyms has not been in the focus of onomastic studies. Nevertheless, several websites deal with the question and aid the choice of a pseudonym. The study focuses on web applications that advertise themselves as pseudonym generators, several of which further refer to themselves as writer pseudonym generators. These programs aim to ease the creation of literary pseudonyms. However, their use is limited by several factors. The study aims to examine these generators and categorise them based on their usefulness by using names created earlier to examine these generators. As the applications are dominantly programmed according to unprofessional aspects, they provide unique insights for onomastic research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Hong-ying, Zhang. "RUSSIAN PSEUDONYM IN THE BACKGROUND OF CHINESE CULTURE". Humanities And Social Studies In The Far East 18, n.º 1 (2021): 97–102. http://dx.doi.org/10.31079/1992-2868-2021-18-1-97-102.

Texto completo da fonte
Resumo:
This article dwells on the study of the Russian-language literary pseudonym treated in the background of the Chinese linguistic culture. The relevance of this study is determined by the growing interest in studying the comparative aspect of a literary pseudonym from the position of a representative of the Chinese linguistic culture. The main purpose of this article is to study the features of literary pseudonyms in Russian and Chinese. Research methods are a method of analysis and synthesis, classification, comparative, contrastive and statistical analyzes. The study reveals that a pseudonym and culture are in a symbiotic relationship, since cultural changes can cause changes in the content of pseudonyms. Consequently, we have the right to consider a literary pseudonym as a phenomenon of linguaculture, taking into account the fact that the linguistic features of Russian and Chinese pseudonyms are evidence of the differences between the two sociocultural systems. These differences make it possible to consider a literary pseudonym, at the same time representing a kind of historical phenomenon, as a product of historical development that arises in certain cultural and historical conditions, absorbing the features of its time, closely related to traditional values and the life experience of their carriers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Lee, Jong-Hyouk, Giwon Lee e Sangheon Pack. "Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change". International Journal of Distributed Sensor Networks 11, n.º 5 (janeiro de 2015): 189389. http://dx.doi.org/10.1155/2015/189389.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Pattison, George. "Pseudonyms? What Pseudonyms? There were no Pseudonyms…". Kierkegaard Studies Yearbook 24, n.º 1 (12 de setembro de 2019): 243–66. http://dx.doi.org/10.1515/kierke-2019-0010.

Texto completo da fonte
Resumo:
AbstractThe paper argues that the question of Kierkegaard’s pseudonyms has been largely misconceived. Referencing comparable devices such as anonymity, noms de plume, and heteronyms, and drawing on Heidegger’s discussion of Kierkegaardian pseudonymity in the lectures on Parmenides, the paper further distinguishes between fictional characters (e. g. the Seducer and Assessor Vilhelm), noms de plume (H.H.), fictional editors, and pseudonyms proper. It is argued that in the first authorship only Constantin Constantius and Johannes Climacus approximate to the criteria Kierkegaard himself lays down for pseudonymity. Furthermore, Kierkegaard’s anxieties regarding the form of publication of his works in the late 1840s reveals the whole project of pseudonymity collapsing into incoherence. By means of a comparison with Nietzsche, it is argued that Kierkegaard’s work is less a manifold of different literary personalities and more a play of revealing/concealing voices. In these voices there is nevertheless a literary watermark that makes Kierkegaard’s work as a whole distinctively Kierkegaardian.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

He, Bintao, e Shangping Wang. "A Traceable Self-Generated Pseudonym Scheme in VANETs". Journal of Physics: Conference Series 2384, n.º 1 (1 de dezembro de 2022): 012020. http://dx.doi.org/10.1088/1742-6596/2384/1/012020.

Texto completo da fonte
Resumo:
Abstract The generation of the pseudonym in vehicular ad hoc networks (VANETs) usually requires the participation of a trusted center (TA), and it needs multiple interactions with the TA. To address these problems, we propose a novel traceable self-generated pseudonym based on the non-interactive zero-knowledge proof (NIZK) and consortium blockchain in VANETs. In our scheme, a self-generated pseudonyms method is introduced to eliminate excessive communication burden, and a consortium blockchain is composed of multiple roadside units (RSUs) to replace the TA. RSUs in the consortium blockchain verify the effectiveness of OBU’s self-generated pseudonyms through the consensus mechanism. Multiple trace authorities (TRAs) are designed to jointly tracking of the real identity of the OBU, which effectively prevents the abuse of supervision by the only supervisor.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Victor, Savelyev. "PSEUDONYMS INCLUDING CHURCH SLAVONIC NAMES OF CYRILLIC LETTERS: STRUCTURE AND METHODS OF FORMATION ARTICLE 2". Lomonosov Journal of Philology, n.º 3, 2023 (19 de junho de 2023): 21–33. http://dx.doi.org/10.55959/msu0130-0075-9-2023-47-3-2.

Texto completo da fonte
Resumo:
In the second article of a series devoted to the study of the structure and methods of formation of pseudonyms, which include in their composition Church Slavonic names of Cyrillic letters (based on the Dictionary of Pseudonyms of Russian Writers, Scientists and Public Figures by I.F. Masanov), complex pseudonyms are analyzed. It is established that they may include one or more Church Slavonic names of Cyrillic letters; complex pseudonyms can be motivated by the author’s name entirely (all components are the names of Cyrillic letters and correlate with the first name, patronymic and/or surname of the author) or partially (at least one of the components does not correlate with the first name, patronymic and/or surname of the author), or not motivated by the author’s name. The analysis of the material shows that in complex pseudonyms motivated by the author’sonym, the names of the letters that form the pseudonym are arranged in the order corresponding to the combination ‘author’s first name - surname’ or ‘author’s first name - middle name’, regardless of whether it corresponds to the order of the letters in the alphabet. It is found that in a number of cases the same authors used motivated simple and complex pseudonyms, correlated with different producing bases. A special group among pseudonyms motivated by the author’sonym are combinations of the Church Slavonic name of the first letter of the surname and the first letter of the first name or full name of the author. It is established that the use of the name of a letter when creating a complex pseudonym is often combined with the language game of the author, who resorts to the transformation of a precedent text (proverb, Church Slavonic cliché, two-word Church Slavonic name of a letter, etc.).
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

SAVELYEV, VICTOR. "PSEUDONYMS INCLUDING CHURCH SLAVONIC NAMES OF CYRILLIC LETTERS: STRUCTURE AND METHODS OF FORMATION (ARTICLE 1)". Lomonosov Journal of Philology, n.º 2, 2023 (1 de maio de 2023): 71–83. http://dx.doi.org/10.55959/msu0130-0075-9-2023-47-2-5.

Texto completo da fonte
Resumo:
In a series of articles on the material of the Dictionary of Pseudonyms of Russian Writers, Scientists and Public Figuresby I.F. Masanov we consider the structure and methods of formation of pseudonyms, which include in their composition Church Slavonic names of Cyrillic letters. There are simple (single-word) and complex aliases. It is established that the inclusion of letter names in pseudonyms in most cases is motivated by the author’s onym (most often the first letter of the name or surname), his other pseudonym or the onym of another author. In the first article of the cycle, an analysis of statistical data is made, indicating that this model had the greatest productivity in the period from the 70s of the 19thcentury to the 10s of the 20thcentury. That was the time when the study of the Church Slavonic alphabet was mandatory in educational institutions of various types, as evidenced by the data of the ABC-books and primers of the pre-revolutionary era. It is pointed out that the importance of the Church Slavonic alphabet for a native speaker of the 19thcentury is also evidenced by the fact that the Church Slavonic names of Cyrillic letters were often used in phraseological units of various types. In the second part of the article, simple pseudonyms are considered: the features of their formation and graphic design are described. Analysis of the material shows that the most commonly used are simple pseudonyms, which are the names of the first letters of the alphabet - Az, Buki, Vedi, Glagol, as well as the letter Fita. It is noted that as pseudonyms, not motivated by the author’s onym, the names of only two letters are regularly used - Azand Buki. The features of the functioning of the pseudonyms Fitaand Firth, as well as the pseudonym Yus, are established.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Ullah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple e Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs". Sensors 21, n.º 9 (28 de abril de 2021): 3077. http://dx.doi.org/10.3390/s21093077.

Texto completo da fonte
Resumo:
Location privacy is a critical problem in the vehicular communication networks. Vehicles broadcast their road status information to other entities in the network through beacon messages. The beacon message content consists of the vehicle ID, speed, direction, position, and other information. An adversary could use vehicle identity and positioning information to determine vehicle driver behavior and identity at different visited location spots. A pseudonym can be used instead of the vehicle ID to help in the vehicle location privacy. These pseudonyms should be changed in appropriate way to produce uncertainty for any adversary attempting to identify a vehicle at different locations. In the existing research literature, pseudonyms are changed during silent mode between neighbors. However, the use of a short silent period and the visibility of pseudonyms of direct neighbors provides a mechanism for an adversary to determine the identity of a target vehicle at specific locations. Moreover, privacy is provided to the driver, only within the RSU range; outside it, there is no privacy protection. In this research, we address the problem of location privacy in a highway scenario, where vehicles are traveling at high speeds with diverse traffic density. We propose a Dynamic Grouping and Virtual Pseudonym-Changing (DGVP) scheme for vehicle location privacy. Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. We formally present the model and specify the scheme through High-Level Petri Nets (HLPN). The simulation results indicate that the proposed method improves the anonymity set size and entropy, provides lower traceability, reduces impact on vehicular network applications, and has lower computation cost compared to existing research work.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Lopes, Paulo Henrique. "The Mutiny of the Pseudonyms in the Kierkegaardian Authorship". Kierkegaard Studies Yearbook 25, n.º 1 (18 de agosto de 2020): 303–21. http://dx.doi.org/10.1515/kierke-2020-0014.

Texto completo da fonte
Resumo:
Abstract The essay emphasizes the unsolvable tension between activity and passivity implied in Kierkegaard’s reduplication as an author of authors. To characterize the different approaches to pseudonymity, I will use the term Halvbefaren [the inexperienced seaman] to refer to a reading that appeals only to Kierkegaard’s or to the pseudonyms’ authority over the authorship, and Helbefaren [the experienced seaman] to refer to another interpretation that recognizes that unsolvable tension between them. Recurring to the sailing metaphor implicit in these terms that appear in Climacus’ Postscript, I defend the thesis that the pseudonyms open the authorship from within, overcoming Kierkegaard as a usual author, as the only captain of the entire authorship. The mutiny performed by the pseudonyms cannot be resolved by simply transferring the authority to the pseudonyms themselves, and it creates a subjective space in the authorship so it becomes a matter of the experience of the reader.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Ibragimova, S. S. "Semantic-Syntactic relations and cognitive features of Russian and Uzbek pseudonyms". E3S Web of Conferences 413 (2023): 03014. http://dx.doi.org/10.1051/e3sconf/202341303014.

Texto completo da fonte
Resumo:
This article discusses and analyzes the semantic-syntactic relations and cognitive features of Russian and Uzbek pseudonyms, national and cultural originality of pseudonyms. If we compare the languages and cultures of different peoples, we can distinguish matching and non-matching elements. An analysis of the semantics of pseudonyms showed that a pseudonym retains a pre-onomastic meaning and has a peculiar semantics, and the bases of pseudonyms inform about the character of a person, about physical properties and shortcomings, about behavior, about origin, about comparing a person with various objects, animals, plants, about a profession, an occupation, a social position, a particular life event, etc. It should be also emphasized the role of metaphorization in the formation of pseudonyms, since the process of metaphorization (as it is defined by cognitive linguistics) is a very important tool in the creation of pseudonyms. It is closely connected with the literary text, as it predetermines the special position of the context, acting as an aesthetically significant component of the literary text.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Moï, Anna. "Meurtres sans préméditation". PORTAL Journal of Multidisciplinary International Studies 15, n.º 1-2 (26 de junho de 2018): 72–76. http://dx.doi.org/10.5130/portal.v15i1-2.5760.

Texto completo da fonte
Resumo:
This essay expresses my work as a translingual novelist – immigrating from Vietnamese to French. It deals with the impossibility, as a fiction writer reborn in a new language, to recount reality, as the real world is reflected in at least two cultural zones. The use of a pseudonym is the first step to this split reality. A decision that entitles me to a new identity and one that also led to confusion when I encountered a visitor from my past mono-ethnic persona: Marcelino Truong, a French-Vietnamese painter and author of graphic novels. We had first met at the Institute of Political Sciences in Paris prior to a professional meeting twenty-five years later when both our names and careers had drastically changed. I relate to other translingual writers such as Romain Gary, a virtuoso of disguised identities who wrote novels under two different pseudonyms. The second part of the essay is an inspection of Tijana Miletic’s arguments in European literary Immigration into the French Language: Readings of Gary, Kristof, Kundera and Semprun that reflect my own experience: the themes of the double and incest pervade translingual writers’work, as they do mine. Cet essai exprime ma perspective de romancière translingue qui passe d’une langue à l’autre, à savoir, du vietnamien au français. En tant qu’écrivaine dont la renaissance à l’écriture s’effectue dans une nouvelle langue, je constate l’impossibilité de raconter la réalité du fait que le monde réel est reflété à travers au moins deux zones culturelles. L’emploi d’un pseudonyme dans mon cas constitue le premier pas vers cette réalité divisée. C’est une décision qui m’octroie le droit à une nouvelle identité et qui mène aussi à des confusions, par exemple, lorsque je recroise sur mon chemin un visiteur de mon passé monoethnique, Marcelino Truong, un peintre et auteur graphique franco-vietnamien. Vingt-cinq ans avant cette rencontre professionnelle, nous nous sommes croisés à Sciences-Po à Paris. Nos noms et carrières ont radicalement changé depuis. Je m’associe à des écrivains translingues tels que Roman Gary, un virtuose d’identités déguisées qui publie ses romans sous deux pseudonymes différents. Dans la deuxième partie de mon essai j’examine les arguments de Tijana Miletic dans son livre European literary Immigration into the French Language : readings of Gary, Kristof, Kundera and Semprun. Ce qu’elle y décrit reflète ma propre expérience : les thèmes du double et de l’inceste imprègnent l’œuvre de ces écrivains, comme ils imprègnent la mienne.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Brear, Michelle. "Swazi co-researcher participants’ dynamic preferences and motivations for, representation with real names and (English-language) pseudonyms – an ethnography". Qualitative Research 18, n.º 6 (30 de novembro de 2017): 722–40. http://dx.doi.org/10.1177/1468794117743467.

Texto completo da fonte
Resumo:
Using pseudonyms is the accepted and expected ethical practice for maintaining participants’ privacy in qualitative research. However it may not always be ethical, for example in participatory action research (PAR), where academics aim to recognise co-researcher participants’ contributions. I used Bourdieusian theory to analyse data detailing deliberations about, and the dynamic pseudonym-related preferences of, 10 co-researcher participants, generated through an ethnography of PAR in rural Swaziland. The analysis demonstrates the salience of engaging participants in careful deliberations about pseudonyms and the racism and privilege inherent to the practice of White (or otherwise powerful) academics researching and representing non-White (or otherwise marginalized) participants. It further highlights practical strategies academics might employ to facilitate ethical and potentially transformative deliberations with their research participants about pseudonyms, which unmask this racism and privilege.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Tetenkov, Nikolay B. "The "Mystery" of Kierkegaard’s Pseudonyms". Vestnik of Northern (Arctic) Federal University. Series Humanitarian and Social Sciences, n.º 4 (15 de outubro de 2022): 106–12. http://dx.doi.org/10.37482/2687-1505-v200.

Texto completo da fonte
Resumo:
Unriddling S. Kierkegaard’s pseudonyms is important for interpretation of his philosophical views. That is why the issue of his pseudonyms remains one of the most important problems for historians of philosophy and commentators on Kierkegaard’s works. This paper analyses various points of view on the reasons for Kierkegaard’s use of pseudonyms in his philosophical works. Among the opinions of various philosophers presented in the article, key hypotheses can be distinguished viewing pseudonyms as the following: literary characters; Kierkegaard’s experiment; a search for self-identification; understanding the past; an alternative to Hegel’s The Phenomenology of Spirit; alternative forms of human existence; roles played by S. Kierkegaard, who is also the author of these plays; demonstration of representative figures showing the boundaries of forms of human existence; a way to overcome loneliness; means of indirect communication; dissociation of Kierkegaard’s personality. The author believes that the concept of conceptual persona (or character) used by Deleuze and F. Guattari allows us to reveal the “secret” of Kierkegaard’s pseudonyms, since this concept demonstrates the complexity and multidimensionality of pseudonyms. Applying the concept of conceptual persona is relevant since pseudonyms have the same properties as conceptual personae: 1) like conceptual personae, pseudonyms are autonomous from their creator and express their own worldview; 2) dialogism, intrinsic to them, allows them to reveal through dialogue the idea embodied in a pseudonym; 3) among the pseudonyms there are no sympathetic pseudonyms expressing the author’s point of view or antipathetic pseudonyms opposing the author; 4) like conceptual personae, pseudonyms form a plane of immanence; 5) pseudonyms are not identical to a social role or the concept of literary character.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Holmqvist, Moa. "Herr författaren och fru Ljungstedt". Tidskrift för litteraturvetenskap 44, n.º 1 (1 de janeiro de 2014): 17–27. http://dx.doi.org/10.54797/tfl.v44i1.10543.

Texto completo da fonte
Resumo:
Mr. Author and Mrs. Ljungstedt. Aurora Ljungstedt’s Masculine Identity as a Writer, and the Conditions of Her Authorship This article discusses the authorship and pseudonym of one Sweden’s first suspense writers, Aurora Ljungstedt (1821–1908). Writing under the pseudonym ”Claude Gerard”, Ljungstedt became famous for grandiose adventures in Swedish settings. Through previously unknown archival material concerning Ljungstedt’s authorship and private life (such as letters, contracts and diaries) as well as the published works by Ljungstedt, I discuss the conditions of her authorship and the implications of the pseudonym Claude Gerard. Throughout the article I show that Ljungstedt’s male pseudonym was part of a strategic staging of an authorship generally considered to be male. Female writers in Sweden often used male pseudonyms during this period, but for Ljungstedt this was also part of a larger strategy to create a masculine identity as an author. As Ljungstedt’s real name became known in the 1870’s, the style of her authorship transformed into something more widely regarded as ”feminine”.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Zhuang, Luyuan, Nan Guo e Yufan Chen. "TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption". Sensors 23, n.º 3 (19 de janeiro de 2023): 1164. http://dx.doi.org/10.3390/s23031164.

Texto completo da fonte
Resumo:
In VANETs, owing to the openness of wireless communication, it is necessary to change pseudonyms frequently to realize the unlinkability of vehicle identity. Moreover, identity authentication is needed, which is usually completed by digital certificates or a trusted third party. The storage and the communication overhead are high. This paper proposes a triple pseudonym authentication scheme for VANETs based on the Cuckoo Filter and Paillier homomorphic encryption (called TriNymAuth). TriNymAuth applies Paillier homomorphic encryption, a Cuckoo Filter combining filter-level and bucket-level, and a triple pseudonym (homomorphic pseudonym, local pseudonym, and virtual pseudonym) authentication to the vehicle identity authentication scheme. It reduces the dependence on a trusted third party and ensures the privacy and security of vehicle identity while improving authentication efficiency. Experimental results show that the insert overhead of the Cuckoo Filter is about 10 μs, and the query overhead reaches the ns level. Furthermore, TriNymAuth has significant cost advantages, with an OBU enrollment cost of only 0.884 ms. When the data rate in VANETs dr≤ 180 kbps, TriNymAuth has the smallest total transmission delay cost and is suitable for shopping malls and other places with dense traffic.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Mistareeh, Hassan, Matthew Tennyson e Haythem Bany Salameh. "Enhancing privacy-preserving in vehicular cloud through an incentive-based strategy". International Journal of Electrical and Computer Engineering (IJECE) 14, n.º 4 (1 de agosto de 2024): 4078. http://dx.doi.org/10.11591/ijece.v14i4.pp4078-4087.

Texto completo da fonte
Resumo:
The literature has extensively explored vehicle ad hoc networks (VANETs) and vehicular clouds, with a common assumption in these studies being incorporating onboard units (OBUs) in vehicles. OBUs are used to collect and disseminate information between vehicles. Furthermore, numerous studies assume the presence of road infrastructure for communication. Implementing a vehicular cloud can play a vital role in aggregating data on events such as weather conditions, traffic information and accidents. This information is distributed to other vehicles, allowing drivers to make informed decisions and ensure safe driving practices. To protect privacy within the vehicular cloud, pseudonyms serve as a means of communication between vehicles and roadside units (RSU). Numerous existing approaches suggest more frequent updates to vehicle pseudonyms to reduce the likelihood of linking transmitted messages by vehicles. However, some of these strategies overlook situations where vehicle density is low, and vehicles have limited willingness to engage in the pseudonym-changing process. This article introduces an architecture that encourages vehicles to participate in the pseudonym-changing process to enhance vehicle privacy. This is achieved by issuing rewards to vehicles that can be used to access cloud services.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Miller, M., I. Schmidtmann, J. Michaelis e K. Pommerening. "Pseudonyms for Cancer Registries". Methods of Information in Medicine 35, n.º 02 (abril de 1996): 112–21. http://dx.doi.org/10.1055/s-0038-1634649.

Texto completo da fonte
Resumo:
AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be protected by cryptographic and organizational means. A pilot study showed that the proposed procedure gives acceptable synonym and homonym error rates. The methods described are not restricted to cancer registration and may serve as a model for comparable applications in medical informatics.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Donlan, Lisa. "Constructing authorial pseudonyms and authorial identity in online fanfiction communities". Internet Pragmatics 3, n.º 1 (13 de dezembro de 2019): 95–115. http://dx.doi.org/10.1075/ip.00040.don.

Texto completo da fonte
Resumo:
Abstract This article undertakes the first linguistic analysis of the innovative online pseudonyms (e.g., <smollouisandtolharry>, <00Q007Narry>, <b0yfriendsinl0ve>) used by fanfiction authors. Specifically, this research explores the most frequent lexical formation processes employed when creating pseudonyms, why these processes are used, and what they reveal about authorial identity in fanfiction communities. The most common formation methods identified across the 600 names analysed are compounding, blending, and variant spellings. All three of these processes allow authors to create memorable and unique names which distinguish their work from that of other writers in their community. Indeed, despite their use of pseudonyms, these authors are still highlighting their individual authorial identities, and they do this by turning the process of creating a pseudonym into a ludic experiment in linguistic innovation. Consequently, future studies should further explore the relationship between self-selected names and the articulation of identity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Eloundou, Venant. "Les pseudonymes des internautes camerounais : quels procédés et quelles visées communicationnelles ?" SHS Web of Conferences 46 (2018): 01019. http://dx.doi.org/10.1051/shsconf/20184601019.

Texto completo da fonte
Resumo:
Mettant à contribution les principes de l’analyse du discours et de la nomination, cette étude examine les pseudonymes adoptés par les internautes camerounais qui animent les débats sur la toile. Le postulat de base est que même si le fonctionnement de la pseudonymie sur Internet est régi par des caractéristiques générales, il est aussi nécessaire de l’étudier en tenant compte de l’univers socio-discursif où elle est construite, afin de voir comment ces caractéristiques s’adaptent aux différents contextes. Dans cette optique, sont scrutés, les procédés de construction des pseudonymes par les Camerounais de la diaspora et ceux qui résident au pays. Les mécanismes les plus saillants sont : les patronymes pseudonymiques, les indicateurs culturels, l’art, le sport, la toponymie, les facteurs historiques, politiques, idéologiques, philosophiques et l’ethos des internautes. L’étude démontre que la significativité de ces pseudonymes est l’expression des identités, de la culture et des visions sociopolitiques. Internet offre ainsi un espace de dialogue ou l’identité réelle des acteurs est cryptée. Mais ces masques n’excluent pas la saisie des différentes intentions de communication des internautes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Chaurasia, Brijesh K., Shekhar Verma e G. S. Tomar. "Mechanism for Privacy Preservation in VANETS". International Journal of Grid and High Performance Computing 2, n.º 2 (abril de 2010): 12–22. http://dx.doi.org/10.4018/jghpc.2010040102.

Texto completo da fonte
Resumo:
This paper proposes a mechanism for sustaining privacy of a vehicle in a vehicular ad hoc network (VANET) through pseudonym update. In a VANET, vehicles on the road are involved in dissemination of information as they move. An association can be formed between the physical location of the source vehicle and the transmitted messages. This relationship between the physical vehicle and its identity can breach its privacy. In this work, a strategy for optimal pseudonym update for maximizing privacy has been formulated when a vehicle is being observed by adversaries with different capabilities. Results indicate that updating pseudonyms in accordance to the strategy maximizes the privacy of a vehicle in the given situation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Schoolcraft, Ralph. "For Whom the Beyle Toils: Stendhal and Pseudonymous Authorship". Publications of the Modern Language Association of America 119, n.º 2 (março de 2004): 247–64. http://dx.doi.org/10.1632/003081204x21298.

Texto completo da fonte
Resumo:
The most famous of Henri Beyle's pseudonyms is Stendhal, but it is only one of hundreds adopted by Beyle. I argue that his pseudonyms fall into three categories: those used in personal correspondence to strengthen affective bonds, those used for publication and thus for entry into the literary market, and those developed in the creative process and reserved for private use. The pseudonym Stendhal belongs to the second group, which is characterized by Beyle's attempt to co-opt the prestige of particular predecessors (in this instance, the art historian J. J. Winckelmann, from the village Stendal). The pen names Mocenigo and Dominique are significant examples of the third group, which most closely resembles the Portuguese writer Fernando Pessoa's heteronyms and heralds a modernist vision of authorship.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Luneau, Marie-Pier. "Le nom supposé comme outil de transgression, d’« Un illuminé » au « Frère Untel ». De l’usage de la fausse signature chez les prêtres au Québec (1809-1979)". Articles 70 (12 de dezembro de 2011): 39–55. http://dx.doi.org/10.7202/1006672ar.

Texto completo da fonte
Resumo:
De 1809 à 1979, on relève deux cent soixante-deux cas de brochures ou de livres publiés sous un faux nom par un membre du clergé au Québec. Ce corpus, constituant environ 20 % de l’ensemble des livres et brochures publiés sous pseudonymes au Québec, mérite d’être l’objet d’une étude spécifique. Certains membres du clergé ont, dans l’histoire littéraire, utilisé une fausse signature par pure coquetterie, d’autres s’en sont servi pour contester l’autorité. Mais dans quelle mesure exactement les membres du clergé ont-ils usé de ce subterfuge pour court-circuiter leurs supérieurs? Si la pratique du pseudonyme s’exerce souvent avec la complicité des supérieurs ecclésiastiques, qu’avaient à protéger ces auteurs? Après avoir dressé un panorama de l’usage général du pseudonyme chez les prêtres et les frères au Québec, des cas marquants seront analysés dans leur rapport avec la transgression.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Didouh, Ahmed, Yassin El Hillali, Atika Rivenq e Houda Labiod. "Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication". Energies 15, n.º 3 (18 de janeiro de 2022): 692. http://dx.doi.org/10.3390/en15030692.

Texto completo da fonte
Resumo:
Vehicular ad hoc networks allow vehicles to share their information for the safety and efficiency of traffic purposes. However, information sharing can threaten the driver’s privacy as it includes spatiotemporal information, and the messages are unencrypted and broadcasted periodically. Therefore, they cannot estimate their privacy level because it also depends on their surroundings. This article proposes a centralized adaptive pseudonym change scheme that permits the certificate’s authority to adjust the pseudonyms assignment for each requesting vehicle. This scheme adapts dynamically depending on the density of the traffic environment and the user’s privacy level, and it aims to solve the trade-off problem between wasting pseudonyms and Sybil attack. We employ a Knapsack problem-based algorithm for target tracking and an entropy-based method to measure each vehicle’s privacy. In order to demonstrate the applicability of our framework, we use real-life data captured during the interoperability tests of the European project InterCor. According to the experimental results, the proposed scheme could easily estimate the level of confidentiality and, therefore, may best respond to the adaptation of the pseudonyms.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Jaimes, Luz Marina Santos, e Edson Dos Santos Moreira. "Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs". DYNA 86, n.º 211 (1 de outubro de 2019): 157–66. http://dx.doi.org/10.15446/dyna.v86n211.75602.

Texto completo da fonte
Resumo:
Pseudonym change schemes have been studied in VANETs to guarantee the property of untraceability of the vehicles. This paper proposes a new condition based on the assumption that if there are no malicious vehicles around when a synchronous change triggers, there is no risk of tracking, and the pseudonym change defers until a time threshold. Thus, our proposal based on a synchronous strategy to increase the anonymity set, adds to the change condition, the checking of the reputation status of the neighbouring vehicles. The reputation status is the result of discretizing the reputation score of the vehicles and it is part of the periodically broadcast beacon messages. The proposal was evaluated through simulations using a real scenario. The results showed an optimization in the use of pseudonyms maintaining similar anonymity levels with other schemes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Mushtaq, Mehreen, Ata Ullah, Humaira Ashraf, N. Z. Jhanjhi, Mehedi Masud, Abdulmajeed Alqhatani e Mrim M. Alnfiai. "Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles". Sensors 23, n.º 11 (31 de maio de 2023): 5217. http://dx.doi.org/10.3390/s23115217.

Texto completo da fonte
Resumo:
The Internet of vehicles (IoVs) is an innovative paradigm which ensures a safe journey by communicating with other vehicles. It involves a basic safety message (BSM) that contains sensitive information in a plain text that can be subverted by an adversary. To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in different zones or contexts. In base schemes, the BSM is sent to neighbors just by considering their speed. However, this parameter is not enough because network topology is very dynamic and vehicles can change their route at any time. This problem increases pseudonym consumption which ultimately increases communication overhead, increases traceability and has high BSM loss. This paper presents an efficient pseudonym consumption protocol (EPCP) which considers the vehicles in the same direction, and similar estimated location. The BSM is shared only to these relevant vehicles. The performance of the purposed scheme in contrast to base schemes is validated via extensive simulations. The results prove that the proposed EPCP technique outperformed compared to its counterparts in terms of pseudonym consumption, BSM loss rate and achieved traceability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Chien, Hung-Yu. "Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication". Electronics 10, n.º 7 (26 de março de 2021): 789. http://dx.doi.org/10.3390/electronics10070789.

Texto completo da fonte
Resumo:
Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Nerkiz, Ummuhan. "Ahmet Rasim’in Rumuz ve Müstear İsimleri". International Journal of Social Sciences 7, n.º 30 (15 de julho de 2023): 336–64. http://dx.doi.org/10.52096/usbd.7.30.23.

Texto completo da fonte
Resumo:
Nicknames and pseudonyms are one of the subjects that should be studied carefully in Turkish literature. Nicknames and pseudonyms are “fake names” and “symbols” that poets and writers use to hide their real identities for various reasons. These names and symbols, which are extremely important in identifying the works of poets and writers, allow literary historians to make more accurate analyzes about poets and writers. Therefore, each new nicknames and pseudonym identified has a great importance in eliminating the deficiencies of the literary history. Ahmet Rasim (1865-21 September 1932) produced works in different literary genres such as poetry, stories, novels, memoirs, anecdotes, conversations, articles, essays, translations, history, criticism, and monographs throughout his 48-year writing life. The author also has school books and scientific works. However, his main qualification is journalism. Ahmet Rasim, who makes a living with his pen, wrote and published articles in different literary genres under different pseudonyms in the magazines and newspapers he worked for. Situations and thoughts like not being confident enough to put your real name on your works when he was just starting his life in literature and the press, show the writer staff of magazines and newspapers rich, distinguish between humorous and serious writing, attracting female readers attention, avoiding the reaction of his works depending on the social, political and literary conditions of the period and breaking of the censor can be counted among the reasons why Ahmet Rasim used different nicknames and pseudonyms. Although Ahmet Rasim uses many nickname and pseudonyms, very few of them are known by the literary world. In this study, the nickname and pseudonyms that we determined to be used by the author will be revealed. Keywords: Ahmet Rasim, literature and press, journalism, nickname and pseudonyms.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Michael, Tomy. "Pelatihan Penulisan Buku dan Nama Samaran". Jurnal Nasional Pengabdian Masyarakat 1, n.º 1 (31 de dezembro de 2020): 132–36. http://dx.doi.org/10.47747/pengabdiankepadamasyarakat.v1i1.123.

Texto completo da fonte
Resumo:
The pseudonym given by Law No. 3-2017 will present a dilemma for lecturers in producing scientific books obtained at the National Library. Activities carried out with careful planning, activities carried out and the results of discussions about what will be written in books and popular articles that can be written by the participants. Training activities essentially provide an understanding of the rights and obligations of special authors in pseudonyms. Popular themes for lecturers with ISI, ASBI and Popular Article themes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Fadhil, Ali Muayed, Norashidah Md Din, Norazizah Binti Mohd Aripin e Ali Ahmed Abed. "Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems". International journal of Computer Networks & Communications 16, n.º 2 (29 de março de 2024): 71–86. http://dx.doi.org/10.5121/ijcnc.2024.16205.

Texto completo da fonte
Resumo:
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Saeed, Mamoon M., Rashid A. Saeed, Rania A. Mokhtar, Hesham Alhumyani e Elmustafa Sayed Ali. "A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks". Security and Communication Networks 2022 (30 de março de 2022): 1–11. http://dx.doi.org/10.1155/2022/7487600.

Texto completo da fonte
Resumo:
Due to the development in 5G mobile communications, user privacy becomes the main challenge, especially with the multiplicity of services and applications that can be accessed. Location privacy is related to the user privacy in terms of the possibility of tracking and unwanted advertisements, as well as the possibility of exposure to suspicious activities and terrorist attacks based on the user location. Accordingly, previous mobile systems use pseudonyms instead of a permanent identity to preserving the user’s location privacy in mobile networks, by what is known as the Cellular Radio Network Temporary Identifiers (C-RNTIs). The C-RNTI protects the user privacy relatively, but it faces some problems due to the clear text of the user in CRNI exchange, which will make the user easily trackable by man-in-the-middle attack. This article aims at proposing a new algorithm that improves the user’s location privacy and enhances the capabilities of the 5G infrastructure in terms of confidentiality and privacy. The idea is based on the use of a novel variable pseudonym (V-RNTI) algorithm that acts as a radio channel identifier for the user, which improves the allocation of pseudonyms to identify users. The proposed algorithm uses different V-RNTI values by the UE and can be changed frequently to improve the pseudonym allocation procedure. This approach can be implemented in 3GPP standard architecture by upgrading UEs and eNB by minor modifications. During this study, the proposed 5G V-RNTI authentication protocol model was built. And then, the automated analysis of the protocol model is performed by using ProVerif Model Checker. The results showed that the model works well without any noticeable problems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Chapnick, Max L. "New Louisa May Alcott Pieces: Radical Sensation in a Culture of Ambiguous Attribution". J19: The Journal of Nineteenth-Century Americanists 11, n.º 1 (março de 2023): 171–85. http://dx.doi.org/10.1353/jnc.2023.a909300.

Texto completo da fonte
Resumo:
Abstract: This essay introduces a set of published but as-yet-unidentified Louisa May Alcott work including: pieces under Alcott's own name that are certainly Alcott's, pieces published anonymously or under known pseudonyms that are very likely Alcott's, and pieces published under a likely new pseudonym, I. or E. H. Gould, that are probably Alcott's. The uncertainty of authorship presented here aims to raise methodological and historicist questions about the author-function in a culture of ambiguous attribution: that writers in Alcott's time participated in author guessing-games and that today's scholarship could be more willing to engage the possibilities of not knowing. Focusing on the fiction, this essay argues that the new pieces from the 1850s produce a reassessment of Alcott's career: rather than her 1860s sensation fiction leading to the later domestic fiction, the sensation fiction of the 1860s itself emerges from years of earlier experimentation. As representative of the newly identified fiction, this essay introduces one short story under Alcott's own name and one short story under the Gould pseudonym.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Ullah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple, Abdul Waheed e Gwnaggil Jeon. "A Distributed Mix-Context-Based Method for Location Privacy in Road Networks". Sustainability 13, n.º 22 (12 de novembro de 2021): 12513. http://dx.doi.org/10.3390/su132212513.

Texto completo da fonte
Resumo:
Preserving location privacy is increasingly an essential concern in Vehicular Adhoc Networks (VANETs). Vehicles broadcast beacon messages in an open form that contains information including vehicle identity, speed, location, and other headings. An adversary may track the various locations visited by a vehicle using sensitive information transmitted in beacons such as vehicle identity and location. By matching the vehicle identity used in beacon messages at various locations, an adversary learns the location history of a vehicle. This compromises the privacy of the vehicle driver. In existing research work, pseudonyms are used in place of the actual vehicle identity in the beacons. Pseudonyms should be changed regularly to safeguard the location privacy of vehicles. However, applying simple change in pseudonyms does not always provide location privacy. Existing schemes based on mix zones operate efficiently in higher traffic environments but fail to provide privacy in lower vehicle traffic densities. In this paper, we take the problem of location privacy in diverse vehicle traffic densities. We propose a new Crowd-based Mix Context (CMC) privacy scheme that provides location privacy as well as identity protection in various vehicle traffic densities. The pseudonym changing process utilizes context information of road such as speed, direction and the number of neighbors in transmission range for the anonymisation of vehicles, adaptively updating pseudonyms based on the number of a vehicle neighbors in the vicinity. We conduct formal modeling and specification of the proposed scheme using High-Level Petri Nets (HPLN). Simulation results validate the effectiveness of CMC in terms of location anonymisation, the probability of vehicle traceability, computation time (cost) and effect on vehicular applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Derrick, Stephanie L. "Is C.S. Lewis the Author of The Strand Magazine's ‘Cricketer's Progress’? Or: a Pretence for Discussing Lewis' Use of Pseudonyms". Journal of Inklings Studies 9, n.º 2 (outubro de 2019): 181–91. http://dx.doi.org/10.3366/ink.2019.0047.

Texto completo da fonte
Resumo:
This article discusses a short non-fiction piece by Clive Hamilton published in 1945 in The Strand Magazine, which was attributed to C.S. Lewis in Index to The Strand Magazine, 1891–1950. The author makes the case that the article, titled ‘Cricketer's Progress: A Famous Reputation and What Became of It’ and about the famous cricket player Maurice Tate, was written by Lewis under a pseudonym that he had used before. This case is made, the author explains, despite the high probability that it was not by him, for the mere fun of arguing the point and as a pretense for discussing Lewis's use of pseudonyms.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Vlasenko, Valeriy, e Oleksandr Kurinnoi. "On the Literary Work of Vasyl Andriievskyi". Sums'ka Starovyna (Ancient Sumy Land), n.º 62 (2023): 35–54. http://dx.doi.org/10.21272/starovyna.2023.62.4.

Texto completo da fonte
Resumo:
The article is dedicated to the literary work of Vasyl Vasyliovych Andriievskyi, the Ukrainian social and political figure, a participant of the Ukrainian revolution of 1917-1921, one of the leaders of the Ukrainian political emigration in Yugoslavia, a writer and a journalist, native of the Chernihiv region. The preface highlights biography and social and political activity of V. Andriievskyi in Ukraine and emigration. It is specified that until recently, his literary work was not known, because he published his stories under pseudonyms and cryptonyms. Owing to processing of the archival-investigation case of V. Andriievskyi, which is stored in the Sectoral State Archive of the Security Service of Ukraine, the origin of pseudonyms was found out and the circle of magazines in which his prose works were published was determined. Four stories by V. Andriievskyi under the pseudonym “Vasyl Nekrashevych” are published for the first time, which are printed in the month of writing, art, science and public life “Nova Ukraina” (“New Ukraine”) (Prague, 1923, editors V. Vynnychenko, M. Shapoval) as well as in the illustrated fortnightly “Svit” (“The World”) (Lviv, 1926-1927, chief editor I. Kvasnytsia).
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Humberstone, Lloyd. "Names and Pseudonyms". Philosophy 70, n.º 274 (outubro de 1995): 487–512. http://dx.doi.org/10.1017/s0031819100065761.

Texto completo da fonte
Resumo:
Was there such a person as Lewis Carroll? An affirmative answer is suggested by the thought that Lewis Carroll was Charles Dodgson, and since there was certainly such a person as Charles Dodgson, there was such a person as Lewis Carroll. A negative answer is suggested by the thought that in arguing thus, the two names ‘Lewis Carroll’ and ‘Charles Dodgson’ are being inappropriately treated as though they were completely on a par: a pseudonym is, after all, a false or fictitious name. Perhaps we should say instead that there was really no such person as Lewis Carroll, but that when Charles Dodgson published under that name, he was pretending that there was, and further, pretending that the works in question formed part of the literary output of this pretendedly real individual. Whether or not this is correct for the case of ‘Lewis Carroll’, I will be suggesting that an account of this second style–a fictionalist account, for short–is appropriate for at least a good many pseudonyms. We shall get to reasons why it might nonetheless not be especially appropriate in the present case in due course: one advantage of the ‘Lewis Carroll’/‘Charles Dodgson’ example, such qualms notwithstanding, is that everyone (likely to be reading this) is familiar not only with both names but with which of them is the pseudonym. Another is that, as we shall have occasion to observe below, Dodgson himself had some interesting views on this particular case of pseudonym(it)y.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Marocco, Beatriz, Nilsângela Cardoso Lima e Karine Moura Vieira. "A estratégia da invisibilidade em O Dia. Contribuição para o estudo do pseudônimo". Sur le journalisme, About journalism, Sobre jornalismo 3, n.º 1 (15 de abril de 2014): 44–57. http://dx.doi.org/10.25200/slj.v3.n1.2014.129.

Texto completo da fonte
Resumo:
Este estudo relaciona autoria jornalística e invisibilidade autoral tendo como ponto de inflexão o pseudônimo. Como a figura da autoria encontra pouca ressonância nos estudos de jornalismo no Brasil, a tentativa de compreender uma de suas arestas combina pesquisa bibliográfica conceitual e análise do discurso de um jornal de Teresina, capital do Estado do Piauí, situado no Nordeste brasileiro, na década de 1950. Ao contrário dos estudos longitudinais que foram feitos em jornais dos Estados Unidos e da Inglaterra sobre autoria (byline), nos interessa explorar em perspectiva histórica um pequeno corpus de documentos sobre a mecânica de poder que subjaz à ocultação da identidade. Em que condições de possibilidade o jornalista se oculta atrás do pseudônimo? Nas edições estudadas do jornal O Dia, o uso do pseudônimo (fake byline) dá suporte a um autor coagido que participa de um jogo singular em que o modo de produção local potencializa a estratégia que articula os interesses da empresa, a política e o público a uma estilística própria da erudição. Sob a invisibilidade, os jornalistas, geralmente intelectuais, criticaram o poder público e os seus desafetos, construíram um espaço inédito de trocas com os leitores e imprimiram ao texto características que associaram jornalismo, retórica e filosofia. No âmbito de uma propedêutica jornalística, o pseudônimo foi usado ainda no esquema de orientação para a boa prática e nas críticas do exercício profissional fora do controle disciplinar. O ideal jornalístico, sonhado igualmente por estes jornalistas, foi inspirado nas lições do Iluminismo, com que pretendiam resgatar as multidões da ignorância. Nesta pequena região discursiva, ocupada pelo fenômeno, foi possível, portanto, avançar em relação ao que já havia sido verificado na imprensa norte-americana e inglesa no século XX, em que o pseudônimo foi usado quando o jornalista pretendia se proteger de retaliações ou por razões políticas. This study examines journalistic authorship and authorial invisibility from the perspective of pseudonym use. As the question of authorship is rare in journalism studies in Brazil, the attempt to understand this phenomenon combines conceptual bibliographical research with an analysis of the discourses printed in a newspaper from Teresina (capital of the state of Piauí located in northeastern Brazil) in the 1950s. Unlike longitudinal studies on newspaper authorship (the byline) in the United States and England, our interests lie in exploring the historical perspective of a small corpusof documents in order to study the mechanics of power that underlie the concealment of identity. What conditions incite journalists to hide behind a pseudonym? In the regional editions of the O Dia newspaper, the use of the pseudonym (fake byline) permitted a constrained author to participate in a unique game in which the modality of production favoured a strategy that put forth the interests of business, public policy, and the public in its own stylistic expression. Behind a cloak of invisibility, journalists (generally intellectuals) often criticized their adversaries and government. They also created an innovative space in which to exchange with readers, and added to their writing elements linking journalism, rhetoric, and philosophy. Within the framework of a journalistic propaedeutics, the pseudonym also served as a vehicle to promote good practices and critique professional form, outside disciplinary control. The journalistic ideal dreamed of by these journalists was inspired by the lessons of the Enlightenment: extirpate the ignorance afflicting the masses. In this small discursive region taken up by the phenomenon, it was therefore possible to move beyond what had been the case in the American and English press in the twentieth century where the pseudonym was used for political reasons, or when journalists sought to protect themselves from reprisal. Cette étude met en relation la paternité journalistique et l’invisibilité du droit d’auteur sous la perspective de l’utilisation du pseudonyme. Parce que la question de la paternité est assez rare dans les études sur le journalisme au Brésil, la tentative de comprendre cet aspect associe une recherche bibliographique conceptuelle et une analyse de discours d’un journal de Teresina, capitale de l’État du Piauí, situé dans le Nordeste brésilien, au cours des années 1950. Contrairement aux études longitudinales qui ont été faites sur des journaux aux États-Unis et en Angleterre (byline), nous explorons un petit corpus de documents afin d’étudier la mécanique du pouvoir qui sous-tend l’occultation de l’identité. Quelles sont les conditions qui poussent le journaliste à disparaître derrière un pseudonyme ? Dans les éditions régionales du journal O Dia, l’usage du pseudonyme (fake byline) permet à un auteur sous contrainte de participer à un jeu singulier dans lequel le mode de production favorise une stratégie qui articule les intérêts de l’entreprise, la politique et le public autour d’une stylistique propre à l’érudition. Sous couvert d’invisibilité, les journalistes, généralement intellectuels, ont critiqué leurs adversaires et le pouvoir politique. Ils ont également construit un espace inédit d’échanges avec les lecteurs et ajouté à l’écriture des caractéristiques associant journalisme, rhétorique et philosophie. Dans le cadre d’une propédeutique journalistique, le pseudonyme a également été utilisé afin d’orienter les bonnes pratiques et de critiquer l’exercice professionnel en dehors du contrôle disciplinaire. L’idéal journalistique dont rêvaient ces journalistes s’inspira des leçons de l’Illuminisme grâce auxquelles ils souhaitaient extraire les masses de leur ignorance. Au sein de cette petite zone discursive occupée par le phénomène, il a donc été possible d’évoluer par rapport à ce qui avait été vérifié dans les presses américaine et anglaise du XXe siècle, au sein desquelles le pseudonyme était employé pour des raisons politiques ou lorsque le journaliste cherchait à se protéger des représailles.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Al-Mekhlafi, Zeyad Ghaleb, Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Alsaffar e Abdulrahman Alsewari. "Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks". Electronics 12, n.º 4 (8 de fevereiro de 2023): 872. http://dx.doi.org/10.3390/electronics12040872.

Texto completo da fonte
Resumo:
The privacy and security of the information exchanged between automobiles in 5G-enabled vehicular networks is at risk. Several academics have offered a solution to these problems in the form of an authentication technique that uses an elliptic curve or bilinear pair to sign messages and verify the signature. The problem is that these tasks are lengthy and difficult to execute effectively. Further, the needs for revoking a pseudonym in a vehicular network are not met by these approaches. Thus, this research offers a fog computing strategy for 5G-enabled automotive networks that is based on the Chebyshev polynomial and allows for the revocation of pseudonyms. Our solution eliminates the threat of an insider attack by making use of fog computing. In particular, the fog server does not renew the signature key when the validity period of a pseudonym-ID is about to end. In addition to meeting privacy and security requirements, our proposal is also resistant to a wide range of potential security breaches. Finally, the Chebyshev polynomial is used in our work to sign the message and verify the signature, resulting in a greater performance cost efficiency than would otherwise be possible if an elliptic curve or bilinear pair operation had been employed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Law, Brenda M. "Pseudonyms". Musical Times 126, n.º 1708 (junho de 1985): 333. http://dx.doi.org/10.2307/964026.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Alqarni, Ali Mohammed. "Gender Differences in Online Identity: A Linguistic Contrastive Study of Arabic and English Screen Names in the Saudi Context". World Journal of English Language 13, n.º 1 (12 de dezembro de 2022): 212. http://dx.doi.org/10.5430/wjel.v13n1p212.

Texto completo da fonte
Resumo:
The considerations behind choosing pseudonyms over the real name may be varied depending upon extraneous or intrinsic circumstances including the need to circumvent social norms, taboos, and practices. However, one that transcends these bounds is the affordance of freedom to act natural that comes with adopting a pseudonym which masks one’s true identity. The vast choice of media for social expression in the age of technology has added a new dimension to the practice of adopting pseudonyms. Accordingly, this study investigates whether patterns of screen name choice and typology are discernible among Saudi male and female students. The study created a database of two hundred screen names selected from the forums of foundation year at two Saudi universities (male =100 and female =100). The screen names gained are classified and examined based on the attraction theories’ framework. As far as findings are concerned, the choice and typology of screen names according to the type of gender are significant. The screen names are varied whether the gender is male or female. Findings also show that the "real names" category is applied by female students in screen names more than male students whereas "unreal names" category is applied more by male students than the females. For fictional names, both male and female students prefer to use romantic names and neglected names which show wealth or looks. Three new categories in pseudonyms are found and established in the study i.e., popular, romantic, and real names due to the Saudi contextual variation. A significant effect of choosing the screen names on the names of their devices is also found in the study.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Edwards, Rosalind. "Participant pseudonyms in qualitative family research: a sociological and temporal note". Families, Relationships and Societies 9, n.º 3 (1 de novembro de 2020): 383–97. http://dx.doi.org/10.1332/204674319x15656015117484.

Texto completo da fonte
Resumo:
This article explores the pseudonyms that UK-based family sociologists have used to refer to and discuss participants in writing up their studies from the post-war to the present day. It takes a sociological and temporal perspective on the conventions for naming research participants in qualitative studies of family life. Drawing on major monographs reporting on studies of family lives across the period, I show that, over time, since the 1950s and 1960s, (pseudo)naming practice has reflected a firm trajectory towards an intimate rather than neutral research relationship, with the use of personal names able to convey a sense of closeness to the particular participant by researchers to the readers. I argue that temporal disciplinary investigatory zeitgeists underpin pseudonym conventions, and that personal names have become the normalised, unspoken standard.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

George, Sonia Alice, Steffie Maria Stephen e Arunita Jaekel. "Blockchain-Based Pseudonym Management Scheme for Vehicular Communication". Electronics 10, n.º 13 (30 de junho de 2021): 1584. http://dx.doi.org/10.3390/electronics10131584.

Texto completo da fonte
Resumo:
A vehicular ad hoc network (VANET) consists of vehicles, roadside units, and other infrastructures that communicate with each other with the goal of improving road safety, reducing accidents, and alleviating traffic congestion. For safe and secure operation of critical applications in VANET, it is essential to ensure that only authenticated vehicles can participate in the network. Another important requirement for VANET communication is that the privacy of vehicles and their users must be protected. Privacy can be improved by using pseudonyms instead of actual vehicle identities during communication. However, it is also necessary to ensure that these pseudonyms can be linked to the real vehicle identities if needed, in order to maintain accountability. In this paper, we propose a new blockchain-based decentralized pseudonym management scheme for VANET. This allows the vehicles to maintain conditional anonymity in the network. The blockchain is used to maintain a record of each vehicle and all of its pseudo-IDs. The information in the blockchain can only be accessed by authorized entities and is not available to all vehicles. The proposed distributed framework maintains an immutable record of the vehicle data, which is not vulnerable to a single point of failure. We compared the performance of the proposed approach with a traditional PKI scheme and shown that it significantly reduces the authentication delay.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

BERTHOLD-BOND, DANIEL. "Lunar Musings? An Investigation of Hegel's and Kierkegaard's Portraits of Despair". Religious Studies 34, n.º 1 (março de 1998): 33–59. http://dx.doi.org/10.1017/s0034412597004186.

Texto completo da fonte
Resumo:
Despite his persistent polemics against the Hegelian ‘speculative’ philosophy, Kierkegaard recognized his own ‘enigmatic respect for Hegel’, and one of his pseudonyms (Johannes Climacus) even acknowledged that his ‘own energies are for the most part consecrated to the service’ of speculation. Nowhere are Kierkegaard's energies more productively devoted to this service than in the work of his last pseudonym, Anti-Climacus, The Sickness Unto Death. In this essay, I argue that not only are there structural parallels between the anatomy of despair in The Sickness Unto Death and the analysis of the ‘unhappy consciousness’ in Hegel's Phenomenology, but that there are striking parallels in terms of the actual content of the respective accounts. I develop these parallels in order, finally, to reconsider the terrain of difference between Kierkegaard's Christian therapeutics of despair and Hegel's phenomenological therapeutics.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia