Results 21 to 30 of about 197,054 (272)
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou +7 more
core +4 more sources
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources
A Program Logic for Verifying Secure Routing Protocols [PDF]
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen +5 more
core +5 more sources
Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj +1 more source
Titan brighter at twilight than in daylight [PDF]
Investigating the overall brightness of planets (and moons) provides insight into their envelopes and energy budgets [1, 2, 3, 4]. Titan phase curves (a representation of overall brightness vs.
Lavvas, Panayotis +2 more
core +1 more source
Signature Bouquets: Immutability for Aggregated/Condensed Signatures [PDF]
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. Since a service provider is almost never fully trusted, security and privacy of outsourced data are important concerns.
Einar Mykletun +2 more
openaire +1 more source
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method
An aggregate signature turns multi-message multi-authentication into multi-message single-authentication, reducing the required storage space, transmission cost, and number of verification calculations, and is suitable for fast message authentication in ...
Xiuhua Lu +4 more
doaj +1 more source
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj +1 more source
KISS: Stochastic Packet Inspection Classifier for UDP Traffic [PDF]
This paper proposes KISS, a novel Internet classifica- tion engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming appli- cations, we propose a novel classification framework that leverages ...
Finamore, Alessandro +3 more
core +2 more sources
Photochemical hazes in sub-Neptunian atmospheres with focus on GJ 1214 b [PDF]
We study the properties of photochemical hazes in super-Earths/mini-Neptunes atmospheres with particular focus on GJ1214b. We evaluate photochemical haze properties at different metallicities between solar and 10000$\times$solar.
Koskinen, Tommi +4 more
core +6 more sources

