-
1
-
2
-
3
-
4“…Therefore, both person-centricity issues and a separation of pseudonymization and de-pseudonymization stood out as a central theme in our examination. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
5“…CONCLUSION: We discuss the degree of privacy protection provided by implementing pseudonymization into research data collection processes. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
6por Mushtaq, Mehreen, Ullah, Ata, Ashraf, Humaira, Jhanjhi, N.Z, Masud, Mehedi, Alqhatani, Abdulmajeed, Alnfiai, Mrim M.“…To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in different zones or contexts. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
7“…BACKGROUND: Medical research networks rely on record linkage and pseudonymization to determine which records from different sources relate to the same patient. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
8“…To secure these sensitive data, national and international data protection laws and regulations demand the separation of identifying data from biomedical data and to introduce pseudonyms. Neither the formulation in laws and regulations nor existing pseudonymization concepts, however, are precise enough to directly provide an implementation guideline. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
9“…In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
10por Ali, Qazi Ejaz, Ahmad, Naveed, Malik, Abdul Haseeb, Rehman, Waheed Ur, Din, Aziz Ud, Ali, Gauhar“…ASPA only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
11por Véliz, Carissa“…Costs can minimise the risks of anonymity by providing a reasonable degree of accountability. Pseudonymity is a tool that can help us regulate those costs while furthering free speech. …”
Publicado 2018
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
12“…Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
13“…In vehicular ad hoc networks (VANETs), pseudonym change is considered as the vital mechanism to support vehicles’ anonymity. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
14“…Vehicle ad hoc networks (VANETs) are special wireless networks which help vehicles to obtain continuous and stable communication. Pseudonym revocation, as a vital security mechanism, is able to protect legal vehicles in VANETs. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
15“…To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
16por Syed, Shorabuddin, Syed, Mahanazuddin, Syeda, Hafsa Bareen, Garza, Maryam, Bennett, William, Bona, Jonathan, Begum, Salma, Baghal, Ahmad, Zozus, Meredith, Prior, Fred“…The tool, on-demand cohort and API participant identifier pseudonymization (O-CAPP), employs a pseudonymization method based on the type of incoming research data. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
17“…As the level of pseudonymization varies according to the research purpose, the pseudonymization method applied should be carefully chosen. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
18por Al-Shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H.“…This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
19“…In VANETs, owing to the openness of wireless communication, it is necessary to change pseudonyms frequently to realize the unlinkability of vehicle identity. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
20“…The proposed scheme utilizes dynamic pseudonym identity to guarantee user privacy and eliminates redundant computations to enhance efficiency.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto