We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we ...
Sep 11, 2024 · We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy.
We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we ...
It is pointed out that conflicting requirements on privacy and usability cannot be sufficiently considered by a single type of representation of pseudonyms, ...
We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we ...
Possible solutions for alias assignment, alias improvement, and replacement between aliases and pseudonyms are discussed. The suggested approach was realized ...
This paper introduces an architecture that enables users to manage local aliases in a reasonable and usable way. Possible solutions for alias assignment, alias ...
Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We discuss in this paper that ...
People also ask
What is a pseudonym to protect identity?
What is it called when you use a fake name for confidentiality?
Pseudonymisation enhances privacy by replacing most identifying fields within a data record by one or more artificial identifiers, or pseudonyms. There can be a ...
Pseudonymization is a security technique for replacing sensitive data with realistic fictional data. Learn how the GDPR encourages its use.
Missing: presentation | Show results with:presentation