Showing 1 - 20 results of 258 for search '"pseudonym"', query time: 0.50s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    “…Therefore, both person-centricity issues and a separation of pseudonymization and de-pseudonymization stood out as a central theme in our examination. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  5. 5
    “…CONCLUSION: We discuss the degree of privacy protection provided by implementing pseudonymization into research data collection processes. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  6. 6
    “…To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in different zones or contexts. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  7. 7
    “…BACKGROUND: Medical research networks rely on record linkage and pseudonymization to determine which records from different sources relate to the same patient. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  8. 8
    “…To secure these sensitive data, national and international data protection laws and regulations demand the separation of identifying data from biomedical data and to introduce pseudonyms. Neither the formulation in laws and regulations nor existing pseudonymization concepts, however, are precise enough to directly provide an implementation guideline. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  9. 9
    “…In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  10. 10
    “…ASPA only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  11. 11
    by Véliz, Carissa
    Published 2018
    “…Costs can minimise the risks of anonymity by providing a reasonable degree of accountability. Pseudonymity is a tool that can help us regulate those costs while furthering free speech. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  12. 12
    “…Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  13. 13
    “…In vehicular ad hoc networks (VANETs), pseudonym change is considered as the vital mechanism to support vehicles’ anonymity. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  14. 14
    “…Vehicle ad hoc networks (VANETs) are special wireless networks which help vehicles to obtain continuous and stable communication. Pseudonym revocation, as a vital security mechanism, is able to protect legal vehicles in VANETs. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  15. 15
    “…To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  16. 16
    “…The tool, on-demand cohort and API participant identifier pseudonymization (O-CAPP), employs a pseudonymization method based on the type of incoming research data. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  17. 17
    by Shin, Soo-Yong, Kim, Hun-Sung
    Published 2021
    “…As the level of pseudonymization varies according to the research purpose, the pseudonymization method applied should be carefully chosen. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  18. 18
    “…This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  19. 19
    by Zhuang, Luyuan, Guo, Nan, Chen, Yufan
    Published 2023
    “…In VANETs, owing to the openness of wireless communication, it is necessary to change pseudonyms frequently to realize the unlinkability of vehicle identity. …”
    Get full text
    Get full text
    Get full text
    Online Article Text
  20. 20
    “…The proposed scheme utilizes dynamic pseudonym identity to guarantee user privacy and eliminates redundant computations to enhance efficiency.…”
    Get full text
    Get full text
    Get full text
    Online Article Text
Search Tools: RSS Feed