Results 31 to 40 of about 198,045 (271)

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

open access: yesIEEE Access, 2021
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj   +1 more source

Distributed Network Anomaly Detection on an Event Processing Framework [PDF]

open access: yes, 2017
Network Intrusion Detection Systems (NIDS) are an integral part of modern data centres to ensure high availability and compliance with Service Level Agreements (SLAs).
Jouet, Simon   +2 more
core   +1 more source

Identity-Based Aggregate Signatures [PDF]

open access: yes, 2006
An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer Si signed message Mi, where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is compactness. However, while the aggregate signature itself may be compact, aggregate signature verification might require
Craig Gentry, Zulfikar Ramzan
openaire   +1 more source

Forward Secure Sequential Aggregate Signature Schemes on Lattice

open access: yesJisuanji kexue yu tansuo, 2021
The forward secure sequential aggregate (Fss-Agg) signature has the advantages of forward secure signature and the sequential aggregate signature at the same time. Since its proposal in 2007, it has been widely applied in many application scenarios, such
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj   +1 more source

Titan brighter at twilight than in daylight [PDF]

open access: yes, 2017
Investigating the overall brightness of planets (and moons) provides insight into their envelopes and energy budgets [1, 2, 3, 4]. Titan phase curves (a representation of overall brightness vs.
Lavvas, Panayotis   +2 more
core   +1 more source

Certificateless-based efficient aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2015
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG   +4 more
doaj   +2 more sources

Strategic group lending for banks [PDF]

open access: yes, 2018
Credit institutions often refuse to lend money to small firms. Usually, this happens because small firms are not able to provide collateral to lenders. Moreover, given the small amount of required loans, the relative cost of full monitoring is too high
Marco, Spallone, Mure', Pina
core   +3 more sources

Certificateless Short Aggregate Signature Scheme for Mobile Devices

open access: yesIEEE Access, 2019
Today, data is exploding. A large amount of data needs to be processed in a timely and an efficient manner. Aggregate signatures are an efficient and secure way to handle large numbers of digital signatures. In an aggregate signature scheme, n signatures
Lunzhi Deng, Yixian Yang, Yuling Chen
doaj   +1 more source

Improved Fault-Tolerant Aggregate Signatures

open access: yesThe Computer Journal, 2019
Fault-tolerant aggregate signatures allow the verification algorithm to recognize and verify all the valid individual signatures in an aggregate signature. However, in ordinary aggregate signature schemes, if there is a single faulty individual signature in the valid aggregate, the whole aggregate will be invalid.
Gaoli Wang, Zhenfu Cao, Xiaolei Dong
openaire   +1 more source

SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis [PDF]

open access: yes, 2017
In this paper, we propose a novel approach, called SENATUS, for joint traffic anomaly detection and root-cause analysis. Inspired from the concept of a senate, the key idea of the proposed approach is divided into three stages: election, voting and ...
Abdelkefi, Atef   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy