Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Katrin Borcea-Pfitzmann, Elke Franz 0001, Andreas Pfitzmann |
Usable presentation of secure pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 70-76, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
(un)linkability, digital pseudonyms, privacy, usability, names, mnemonics |
81 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 184-199, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
81 | Elke Franz 0001, Katja Liesebach |
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 22-31, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
72 | Keon-Myung Lee, Sang Ho Lee 0002 |
Privacy-Preserving ID-Based Service Provision in Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, GADA, JTRES, MIOS, WORM, WOSE, PhDS, and INTEROP 2004, Agia Napa, Cyprus, October 25-29, 2004. Proceedings, pp. 21-22, 2004, Springer, 3-540-23664-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Keon-Myung Lee, Sang Ho Lee 0002 |
A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings, pp. 14-25, 2004, Springer, 3-540-24059-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
67 | David Evans 0002, Alastair R. Beresford, Trevor Burbridge, Andrea Soppera |
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 395-400, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Stefan Brands, Liesje Demuynck, Bart De Decker |
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 400-415, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes |
On non-cooperative location privacy: a game-theoretic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 324-337, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
game theory, mobile networks, location privacy |
58 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 276-290, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Stefan Rass, Simone Fuchs, Martin Schaffer, Kyandoghere Kyamakya |
How to protect privacy in floating car data systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008, pp. 17-22, 2008, ACM, 978-1-60558-191-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, anonymization, pseudonyms, discrete logarithm problem |
53 | Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko 0001 |
Self-certified Sybil-free pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 154-159, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, identities, sybil attack |
53 | Oliver Jorns, Oliver Jung, Gerald Quirchmayr |
Transaction pseudonyms in mobile environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 185-194, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Matthias Gerlach, Felix Güttler |
Privacy in VANETs using Changing Pseudonyms - Ideal and Real. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 2521-2525, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Levente Buttyán, Tamás Holczer, István Vajda |
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 129-141, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
location privacy, vehicular ad hoc network, pseudonym |
53 | Michal Feldman, John Chuang |
The Evolution of Cooperation under Cheap Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 284-291, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Peter Schartner, Martin Schaffer |
Unique User-Generated Digital Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 194-205, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Oliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler |
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 100-109, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Joachim Biskup, Ulrich Flegel |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 28-48, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity |
53 | Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen |
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 295-312, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
53 | David Chaum |
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 241-244, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
47 | Jianxiong Liao, Jianqing Li |
Effectively Changing Pseudonyms for Privacy Protection in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN 2009, Kaohsiung, Taiwan, December 14-16, 2009, pp. 648-652, 2009, IEEE Computer Society, 978-0-7695-3908-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
changing pseudonyms, privacy, VANET |
47 | Nana Kesewaa Dankwa |
"All Names are Pseudonyms": A Critical Reflection on Pseudonymizing Names in HCI: "All Names are Pseudonyms". ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: CHI '21: CHI Conference on Human Factors in Computing Systems, Virtual Event / Yokohama Japan, May 8-13, 2021, Extended Abstracts., pp. 34:1-34:6, 2021, ACM, 978-1-4503-8095-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Jong-Hyouk Lee, Giwon Lee, Sangheon Pack |
Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 11, pp. 189389:1-189389:7, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
43 | Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall |
802.11 user fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007, pp. 99-110, 2007, ACM, 978-1-59593-681-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, wireless, anonymity, 802.11 |
43 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 206-221, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Christian Hauser |
Mobility management meets privacy: the failure of existing proposals and a new, future-proof approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 122-124, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multiple identities, privacy, mobility management, mobile IP |
38 | Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham |
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 136-148, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity set (key words), Anonymity, vehicular networks, pseudonyms |
38 | Brijesh Kumar Chaurasia, Shekhar Verma |
Maximizing anonymity of a vehicle through pseudonym updation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 83, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
anonymity set (key words), anonymity, vehicular networks, pseudonyms |
38 | Hung-Yu Chien |
Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 607-614, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Hung-Yu Chien |
DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 615-622, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux |
On the Optimal Placement of Mix Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 216-234, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko 0001 |
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 64-77, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chunum Kong, Min Young Chung, Hyunseung Choo |
Session Key Reuse Scheme to Improve Routing Efficiency in AnonDSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 303-311, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymous Ad Hoc Routing, Key Reuse and Onion |
29 | Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen |
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 321-337, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Thibault Candebat, Cameron Ross Dunne, David T. Gray |
Pseudonym management using mediated identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 1-10, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SEM architecture, location-based services, identity-based encryption, pseudonymity |
29 | Andreas Pfitzmann, Marit Köhntopp |
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 1-9, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Peter D. Dawoud, Dawoud S. Dawoud, R. Peplow |
A proposal for secure vehicular communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1026-1032, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
vehicular communication (VC), privacy, authentication, digital signatures, pseudonyms |
24 | Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao |
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 353-362, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, digital signatures, data privacy, pseudonyms, audit logs, redaction |
24 | Dave Singelée, Bart Preneel |
Location privacy in wireless personal area networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006, pp. 11-18, 2006, ACM, 1-59593-557-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bluetooth, location privacy, pseudonyms |
24 | Panayotis Antoniadis, Costas Courcoubetis, Ben Strulo |
Incentives for content availability in memory-less peer-to-peer file sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(4), pp. 11-20, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cheap pseudonyms, content availability, design, economics, public goods |
24 | John Linn |
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 52-58, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, protocols, pseudonyms, rights management |
24 | Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins |
Anti-aliasing on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 13th international conference on World Wide Web, WWW 2004, New York, NY, USA, May 17-20, 2004, pp. 30-39, 2004, ACM, 1-58113-844-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
alias detection, privacy, personas, aliases, pseudonyms, bulletin boards |
24 | Rüdiger Grimm, Patrick Aichroth |
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 93-99, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LWDRM, light weight digital rights management, virtual goods, privacy, pseudonyms, separation of duty |
24 | Michal Feldman, Kevin Lai, Ion Stoica, John Chuang |
Robust incentive techniques for peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004, pp. 102-111, 2004, ACM, 1-58113-771-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cheap pseudonyms, prisoners dilemma, whitewash, peer-to-peer, reputation, incentives, free-riding, collusion |
24 | Imran Memon, Riaz Ahmed Shaikh 0001, Hidayatullah Shaikh |
Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(5), pp. 13395-13426, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Abdueli Paulo Mdee, Muhammad Toaha Raza Khan, Junho Seo, Dongkyun Kim |
Security Compliant and Cooperative Pseudonyms Swapping for Location Privacy Preservation in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(8), pp. 10710-10723, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Qinglong Wang, YongYong Li, Zhiqiang Tan, Na Fan 0003, GuDi Yao |
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 78, pp. 103616, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Cláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues |
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.03402, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Cláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues |
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3018-3032, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Giovanni Gambigliani Zoccoli, Dario Stabili, Mirco Marchetti |
Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall ![In: 98th IEEE Vehicular Technology Conference, VTC Fall 2023, Hong Kong, SAR, China, October 10-13, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2928-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Ayesha S. Dina, D. Manivannan 0001 |
Conditional Privacy-preserving Authentication and Message Dissemination Scheme using Timestamp based Pseudonyms for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing, IWCMC 2023, Marrakesh, Morocco, June 19-23, 2023, pp. 530-535, 2023, IEEE, 979-8-3503-3339-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Kunchang Li, Yifan Yang, Shuhao Wang |
Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 15(4), pp. 2101-2115, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Georgios Kermezis, Konstantinos Limniotis, Nicholas Kolokotronis |
User-generated pseudonyms through Merkle trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.03673, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Georgios Kermezis, Konstantinos Limniotis, Nicholas Kolokotronis |
User-Generated Pseudonyms Through Merkle Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APF ![In: Privacy Technologies and Policy - 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings, pp. 89-105, 2021, Springer, 978-3-030-76662-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Hacène Fouchal |
Sharing pseudonyms between Intelligent Transport System stations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 47, pp. 101236, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Christopher Hicks, Flavio D. Garcia |
A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020, pp. 460-473, 2020, IEEE, 978-1-7281-5087-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Huafei Zhu, Wee Keong Ng |
Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings, pp. 80-94, 2019, Springer, 978-3-030-23498-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ye Xu, Fengying Li, Bin Cao 0003 |
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ComComAP ![In: Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, China, October 26-28, 2019, pp. 157-162, 2019, IEEE, 978-1-7281-1973-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo |
Privacy Risk Evaluation of Re-Identification of Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019, pp. 165-172, 2019, IEEE. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Imran Memon |
Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 31(11), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Khaled Rabieh, Miao Pan, Zhu Han 0001, Vitaly Ford |
SRPV: A Scalable Revocation Scheme for Pseudonyms-Based Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2018 IEEE International Conference on Communications, ICC 2018, Kansas City, MO, USA, May 20-24, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-3180-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Mirja Nitschke, Philipp Holler, Lukas Hartmann, Dogan Kesdogan |
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, pp. 38-53, 2018, Springer, 978-3-030-03637-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Jaime A. Teixeira da Silva |
Are Pseudonyms Ethical in (Science) Publishing? Neuroskeptic as a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Eng. Ethics ![In: Sci. Eng. Ethics 23(6), pp. 1807-1810, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura |
User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 25, pp. 788-795, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang |
Personalized Pseudonyms for Servers in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2017(4), pp. 271-289, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Jan Camenisch, Anja Lehmann |
Privacy for Distributed Databases via (Un)linkable Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 22, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Kai Fan 0001, Panfei Song, Yintang Yang |
ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 2017, pp. 2349149:1-2349149:7, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Mohsin Khan, Kimmo Järvinen 0001, Philip Ginzboorg, Valtteri Niemi |
On De-synchronization of User Pseudonyms in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 347-366, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Walid Bouksani, Boucif Amar Bensaber |
An efficient and dynamic pseudonyms change system for privacy in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2017 IEEE Symposium on Computers and Communications, ISCC 2017, Heraklion, Greece, July 3-6, 2017, pp. 59-63, 2017, IEEE Computer Society, 978-1-5386-1629-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Vanga Odelu, Ashok Kumar Das, Adrijit Goswami |
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 62(1), pp. 30-38, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Jessye Dos Santos, Christine Hennebert, J. C. Fonbonne, Cédric Lauradoux |
Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2016, Valencia, Spain, September 4-8, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-3254-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Denis Pinkas |
An eID mechanism built along Privacy by Design principles using secure elements, pseudonyms and attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, pp. 93-104, 2016, GI. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Xumin Huang, Jiawen Kang, Rong Yu, Maoqiang Wu, Yan Zhang 0002, Stein Gjessing |
A Hierarchical Pseudonyms Management Approach for Software-Defined Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: IEEE 83rd Vehicular Technology Conference, VTC Spring 2016, Nanjing, China, May 15-18, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1698-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura |
User Identification of Pseudonyms without Identity Information Exposure in Access Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016, pp. 487-492, 2016, IEEE Computer Society, 978-1-4673-8845-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | T. Thenmozhi, R. M. Somasundaram |
Pseudonyms Based Blind Signature Approach for an Improved Secured Communication at Social Spots in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 82(1), pp. 643-658, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Jan Camenisch, Anja Lehmann |
(Un)linkable Pseudonyms for Governmental Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 1467-1479, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Iulia Tunaru, Benoît Denis, Bernard Uguen |
Location-Based Pseudonyms for Identity Reinforcement in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: IEEE 81st Vehicular Technology Conference, VTC Spring 2015, Glasgow, United Kingdom, 11-14 May, 2015, pp. 1-5, 2015, IEEE, 978-1-4799-8088-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil |
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (2) ![In: ICEIS 2015 - Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2, Barcelona, Spain, 27-30 April, 2015, pp. 701-708, 2015, SciTePress, 978-989-758-097-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux, Valtteri Niemi, Philip Ginzboorg |
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 18(3), pp. 413-428, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Seungyeop Han, Vincent Liu 0001, Qifan Pu, Simon Peter 0001, Thomas E. Anderson, Arvind Krishnamurthy, David Wetherall |
Expressive privacy control with pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: ACM SIGCOMM 2013 Conference, SIGCOMM 2013, Hong Kong, August 12-16, 2013, pp. 291-302, 2013, ACM, 978-1-4503-2056-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ken Mano, Kazuhiro Minami, Hiroshi Maruyama |
Protecting location privacy with k-confusing paths based on dynamic pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops, San Diego, CA, USA, March 18-22, 2013, pp. 285-290, 2013, IEEE Computer Society, 978-1-4673-5075-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Adetundji Adigun, Boucif Amar Bensaber, Ismaïl Biskri |
Protocol of change pseudonyms for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN Workshops ![In: 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013 - Workshop Proceedings, pp. 162-167, 2013, IEEE Computer Society, 978-1-4799-0540-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Stefan G. Weber |
On Transaction Pseudonyms with Implicit Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 568, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Ting Li, Yong Feng 0004, Feng Wang 0039, Xiaodong Fu |
A Dynamic Pseudonyms Based Anonymous Routing Protocol for Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: 8th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2012, Chengdu, China, December 14-16, 2012, pp. 82-86, 2012, IEEE Computer Society, 978-1-4673-5808-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Adetundji Adigun, Boucif Amar Bensaber, Ismaïl Biskri |
Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIVANet@MSWiM ![In: Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, DIVANet@MSWiM 2012, Paphos, Cyprus, October 21, 2012, pp. 111-114, 2012, ACM, 978-1-4503-1625-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Joseph Thomas Benin |
Unified distribution of pseudonyms in hybrid ephemeral vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
24 | Gerrit Bleumer |
Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 992-994, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser |
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 19, pp. 317-331, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Javier Campos, Carlos Miguel Tavares Calafate, Marga Nácher, Pietro Manzoni, Juan-Carlos Cano |
HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2011, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Philip Leith |
Pseudonyms, Privacy and Globalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Niels Vandezande |
Identification numbers as pseudonyms in the EU public sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Jan Camenisch, Markulf Kohlweiss, Dieter Sommer |
Pseudonyms and Private Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Privacy - PRIME ![In: Digital Privacy - PRIME - Privacy and Identity Management for Europe, pp. 289-308, 2011, Springer, 978-3-642-19049-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Frank R. Ihmig, Haiko Wick, Karim Hichri, Heiko Zimmermann |
RFID for anonymous biological samples and pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFID-TA ![In: 2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011, Sitges, Spain, September 15-16, 2011, pp. 376-380, 2011, IEEE, 978-1-4577-0028-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jan Lehnhardt, Adrian Spalka |
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings, pp. 113-124, 2011, Springer, 978-3-642-22889-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Joseph Benin, Michael Nowatkowski, Henry L. Owen |
Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall ![In: Proceedings of the 72nd IEEE Vehicular Technology Conference, VTC Fall 2010, 6-9 September 2010, Ottawa, Canada, pp. 1-5, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, Jean-Pierre Hubaux |
On the Age of Pseudonyms in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA, pp. 1577-1585, 2010, IEEE, 978-1-4244-5838-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Damon J. Phillips, Young-Kyu Kim |
Why Pseudonyms? Deception as Identity Preservation Among Jazz Record Companies, 1920-1929. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Organ. Sci. ![In: Organ. Sci. 20(3), pp. 481-499, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
Certified Pseudonyms Colligated with Master Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 190-197, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Kristof Verslype, Bart De Decker |
Service and Timeframe Dependent Unlinkable One-time Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 13-20, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Paolo Penna, Florian Schoppmann, Riccardo Silvestri, Peter Widmayer |
Pseudonyms in Cost-Sharing Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, 5th International Workshop, WINE 2009, Rome, Italy, December 14-18, 2009. Proceedings, pp. 256-267, 2009, Springer, 978-3-642-10840-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|