Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,548,598 papers from all fields of science
Search
Sign In
Create Free Account
Pseudonymity
Known as:
Pseudonymy
, Pseuodnimity
, Pseudonymously
Expand
Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Anonymous Internet banking
Anonymous post
Clock drift
Closed-loop authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
PAL - privacy augmented LTE: a privacy-preserving scheme for vehicular LTE communication
D. Angermeier
,
Alexander Kiening
,
F. Stumpf
Vehicular Ad Hoc Networks
2013
Corpus ID: 9221850
We propose a novel privacy-preserving scheme for LTE in vehicular communication. The main idea behind our concept is to include…
Expand
2010
2010
Begging in Rural India and Bangladesh
D. Massey
,
A. Rafique
,
J. Seeley
2010
Corpus ID: 55550601
This paper makes a case for seeing poor people’s experiences of begging as a living strategy propelled by poverty, economic…
Expand
2009
2009
Soccer Fields of Cultural (Re)Production: Creating "Good Boys" in Suburban America
L. Swanson
2009
Corpus ID: 145227127
Zwick and Andrews (1999) argued that suburban American soccer fields merit critical academic attention because they highlight the…
Expand
Highly Cited
2007
Highly Cited
2007
A Dual Immersion Strand Programme in California: Carrying Out the Promise of Dual Language Education in an English-dominant Context
Deborah K. Palmer
2007
Corpus ID: 143847026
This paper uses ethnographic observation and in-depth interview to look at the ways in which an English-dominant school in…
Expand
2007
2007
On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good?
Rainer Böhme
,
Sven Koble
Workshop on the Economics of Information Security
2007
Corpus ID: 5553313
The collection of personal data in business-to-consumer transactions and respecting the consumers’ privacy preferences are…
Expand
2005
2005
Simple Reputation Systems
J. Kennes
,
A. Schiff
2005
Corpus ID: 53986504
This paper develops a model of simple 'reputation systems' that monitor and publish information about the behavior of sellers in…
Expand
2004
2004
Nurses and Conflict: Workplace Experiences
S. Bishop
2004
Corpus ID: 141761174
2004
2004
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
D. Critchlow
,
Ning Zhang
Comput. Networks
2004
Corpus ID: 29042815
Highly Cited
1997
Highly Cited
1997
Pseudonymous audit for privacy enhanced intrusion detection
M. Sobirey
,
S. Fischer-Hübner
,
Kai Rannenberg
IFIP International Information Security…
1997
Corpus ID: 33535216
Intrusion detection systems can serve as powerful security audit analysis tools. But by analysing the user activities, they are…
Expand
1966
1966
Three Gothic Novels
H. Walpole
,
W. Beckford
,
M. Shelley
,
Peter H. Fairclough
,
M. Praz
1966
Corpus ID: 193859764
The Gothic novel, which flourished from about 1765 until 1825, revels in the horrible and the supernatural, in suspense and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE