-
1
-
2
-
3
-
4“…Therefore, both person-centricity issues and a separation of pseudonymization and de-pseudonymization stood out as a central theme in our examination. …”
Get full text
Get full text
Get full text
Online Article Text -
5“…CONCLUSION: We discuss the degree of privacy protection provided by implementing pseudonymization into research data collection processes. …”
Get full text
Get full text
Get full text
Online Article Text -
6by Mushtaq, Mehreen, Ullah, Ata, Ashraf, Humaira, Jhanjhi, N.Z, Masud, Mehedi, Alqhatani, Abdulmajeed, Alnfiai, Mrim M.“…To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in different zones or contexts. …”
Published 2023
Get full text
Get full text
Get full text
Online Article Text -
7“…BACKGROUND: Medical research networks rely on record linkage and pseudonymization to determine which records from different sources relate to the same patient. …”
Get full text
Get full text
Get full text
Online Article Text -
8“…To secure these sensitive data, national and international data protection laws and regulations demand the separation of identifying data from biomedical data and to introduce pseudonyms. Neither the formulation in laws and regulations nor existing pseudonymization concepts, however, are precise enough to directly provide an implementation guideline. …”
Get full text
Get full text
Get full text
Online Article Text -
9“…In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. …”
Get full text
Get full text
Get full text
Online Article Text -
10by Ali, Qazi Ejaz, Ahmad, Naveed, Malik, Abdul Haseeb, Rehman, Waheed Ur, Din, Aziz Ud, Ali, Gauhar“…ASPA only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. …”
Published 2019
Get full text
Get full text
Get full text
Online Article Text -
11by Véliz, Carissa“…Costs can minimise the risks of anonymity by providing a reasonable degree of accountability. Pseudonymity is a tool that can help us regulate those costs while furthering free speech. …”
Published 2018
Get full text
Get full text
Get full text
Online Article Text -
12“…Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. …”
Get full text
Get full text
Get full text
Online Article Text -
13“…In vehicular ad hoc networks (VANETs), pseudonym change is considered as the vital mechanism to support vehicles’ anonymity. …”
Get full text
Get full text
Get full text
Online Article Text -
14“…Vehicle ad hoc networks (VANETs) are special wireless networks which help vehicles to obtain continuous and stable communication. Pseudonym revocation, as a vital security mechanism, is able to protect legal vehicles in VANETs. …”
Get full text
Get full text
Get full text
Online Article Text -
15“…To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. …”
Get full text
Get full text
Get full text
Online Article Text -
16by Syed, Shorabuddin, Syed, Mahanazuddin, Syeda, Hafsa Bareen, Garza, Maryam, Bennett, William, Bona, Jonathan, Begum, Salma, Baghal, Ahmad, Zozus, Meredith, Prior, Fred“…The tool, on-demand cohort and API participant identifier pseudonymization (O-CAPP), employs a pseudonymization method based on the type of incoming research data. …”
Published 2021
Get full text
Get full text
Get full text
Online Article Text -
17“…As the level of pseudonymization varies according to the research purpose, the pseudonymization method applied should be carefully chosen. …”
Get full text
Get full text
Get full text
Online Article Text -
18by Al-Shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H.“…This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. …”
Published 2022
Get full text
Get full text
Get full text
Online Article Text -
19“…In VANETs, owing to the openness of wireless communication, it is necessary to change pseudonyms frequently to realize the unlinkability of vehicle identity. …”
Get full text
Get full text
Get full text
Online Article Text -
20“…The proposed scheme utilizes dynamic pseudonym identity to guarantee user privacy and eliminates redundant computations to enhance efficiency.…”
Get full text
Get full text
Get full text
Online Article Text