Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,734,367 papers from all fields of science
Search
Sign In
Create Free Account
Pseudonymity
Known as:
Pseudonymy
, Pseuodnimity
, Pseudonymously
Expand
Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Anonymous Internet banking
Anonymous post
Clock drift
Closed-loop authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
PAL - privacy augmented LTE: a privacy-preserving scheme for vehicular LTE communication
D. Angermeier
,
Alexander Kiening
,
F. Stumpf
Vehicular Ad Hoc Networks
2013
Corpus ID: 9221850
We propose a novel privacy-preserving scheme for LTE in vehicular communication. The main idea behind our concept is to include…
Expand
2013
2013
A model and theory of community-based arts and health practice
Anni Raw
2013
Corpus ID: 142665844
This thesis is an ethnographic study of the dynamic world of a hidden arts and health practice. Throughout the UK, and…
Expand
2011
2011
Development of AIDA v4.3b Diabetes Simulator: Technical Upgrade to Support Incorporation of Lispro, Aspart, and Glargine Insulin Analogues
E. Lehmann
,
C. Tarín
,
J. Bondia
,
E. Teufel
,
T. Deutsch
Journal of Electrical and Computer Engineering
2011
Corpus ID: 21737120
Introduction. AIDA is an interactive educational diabetes simulator available on the Internet without charge since 1996…
Expand
2011
2011
Privacy preservation with X.509 standard certificates
Taekyoung Kwon
Information Sciences
2011
Corpus ID: 42952238
2008
2008
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
Richard Au
,
P. Croll
Proceedings of the 41st Annual Hawaii…
2008
Corpus ID: 5850746
A new framework of privacy-preserving identity management for distributed e-health systems is proposed. Utilizing a consumer…
Expand
2004
2004
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
D. Critchlow
,
Ning Zhang
Comput. Networks
2004
Corpus ID: 29042815
2004
2004
A new fair micropayment system based on hash chain
Yong Zongkai
,
Lan Weimin
,
Tan Yunmeng
IEEE International Conference on e-Technology, e…
2004
Corpus ID: 195882539
Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both…
Expand
2004
2004
Nurses and Conflict: Workplace Experiences
S. Bishop
2004
Corpus ID: 141761174
2003
2003
An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks
Jiejun Kong
,
X. Hong
,
M. Gerla
2003
Corpus ID: 11949706
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing…
Expand
1966
1966
Three Gothic Novels
H. Walpole
,
W. Beckford
,
M. Shelley
,
Peter H. Fairclough
,
M. Praz
1966
Corpus ID: 193859764
The Gothic novel, which flourished from about 1765 until 1825, revels in the horrible and the supernatural, in suspense and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE