Results 11 to 20 of about 154,933 (276)

MABS: Multicast Authentication Based on Batch Signature [PDF]

open access: yesIEEE Transactions on Mobile Computing, 2010
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.
null Yun Zhou   +2 more
openaire   +3 more sources

Rheumatoid Arthritis Naive T Cells Share Hypermethylation Sites With Synoviocytes. [PDF]

open access: yes, 2017
ObjectiveTo determine whether differentially methylated CpGs in synovium-derived fibroblast-like synoviocytes (FLS) of patients with rheumatoid arthritis (RA) were also differentially methylated in RA peripheral blood (PB) samples.MethodsFor this study ...
Barcellos, Lisa F   +16 more
core   +1 more source

A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform [PDF]

open access: yes, 2017
Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks.
Bessani, Alysson   +2 more
core   +1 more source

Modeling of 2D and 3D Assemblies Taking Into Account Form Errors of Plane Surfaces [PDF]

open access: yes, 2009
The tolerancing process links the virtual and the real worlds. From the former, tolerances define a variational geometrical language (geometric parameters). From the latter, there are values limiting those parameters.
Adragna   +40 more
core   +5 more sources

A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs

open access: yesIEEE Access, 2022
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion.
Eko Fajar Cahyadi, Min-Shiang Hwang
doaj   +1 more source

Strongly Secure Certificateless Signature Scheme Supporting Batch Verification [PDF]

open access: yesMathematical Problems in Engineering, 2014
We propose a strongly secure certificateless signature scheme supporting batch verification, which makes it possible for a verifier to verify a set of signatures more efficiently than verifying them one by one. In an identity‐based digital signature scheme, private key generator (PKG) knows each user′s signing key, so it can generate a signature which ...
Chun-I Fan, Pei-Hsiu Ho, Yi-Feng Tseng
openaire   +3 more sources

Self-Learning Classifier for Internet traffic [PDF]

open access: yes, 2012
Network visibility is a critical part of traffic engineering, network management, and security. Recently, unsupervised algorithms have been envisioned as a viable alternative to automatically identify classes of traffic. However, the accuracy achieved so
Baralis, Elena Maria   +3 more
core   +1 more source

Unified Transcriptomic Signature of Arbuscular Mycorrhiza Colonization in Roots of Medicago truncatula by Integration of Machine Learning, Promoter Analysis, and Direct Merging Meta-Analysis

open access: yesFrontiers in Plant Science, 2018
Plant root symbiosis with Arbuscular mycorrhizal (AM) fungi improves uptake of water and mineral nutrients, improving plant development under stressful conditions.
Manijeh Mohammadi-Dehcheshmeh   +13 more
doaj   +1 more source

Identification of a Ubiquitin Related Genes Signature for Predicting Prognosis of Prostate Cancer

open access: yesFrontiers in Genetics, 2022
Background: Ubiquitin and ubiquitin-like (UB/UBL) conjugations are one of the most important post-translational modifications and involve in the occurrence of cancers. However, the biological function and clinical significance of ubiquitin related genes (
Guoda Song   +10 more
doaj   +1 more source

Random Access for Machine-Type Communication based on Bloom Filtering [PDF]

open access: yes, 2016
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a \emph{signature} during the contention process.
Madueno, German Corrales   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy