Pseudonyms

Known as: Pseudonym 
A fictitious name used when the person performs a particular social role.

Topic mentions per year

Topic mentions per year

1949-2018
0204019492017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
To protect mobile phone from tracking by third parties, mobile telephony systems rely on periodically changing pseudonyms. We… (More)
Is this relevant?
2011
2011
Changing pseudonyms are commonly accepted as one approach to protect location privacy in VANETs, but the effectiveness of most… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Accurate and reliable information sharing is essential in the healthcare domain. Currently, however, information about individual… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Security and especially privacy is an important requirement for the success of vehicular ad hoc networks (VANETs) in the future… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, we present a synchronization-based communication protocol for RFID devices. We focus on the EPCGlobal Class-1 Gen… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Pseudonym systems allow users to interact with multiple orga nizations anonymously using pseudonyms The pseudonyms cannot be… (More)
Is this relevant?
1999
1999
Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
We consider the problems of societal norms for cooperation and reputation when it is possible to obtain “cheap pseudonyms… (More)
Is this relevant?
1996
1996
In order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data… (More)
Is this relevant?