Results 31 to 40 of about 154,933 (276)
Fast Batch Verification of Multiple Signatures [PDF]
We propose an efficient batch verification of multiple signatures generated by different signers as well as a single signer. We first introduce a method to generate width-w Non-Adjacent Forms (w-NAFs) uniformly. We then propose a batch verification algorithm of exponentiations using w-NAF exponents, and apply this to batch verification for the modified
Jung Hee Cheon, Jeong Hyun Yi
openaire +1 more source
Sign-Compute-Resolve for Tree Splitting Random Access [PDF]
We present a framework for random access that is based on three elements: physical-layer network coding (PLNC), signature codes and tree splitting. In presence of a collision, physical-layer network coding enables the receiver to decode, i.e.
Goseling, Jasper +2 more
core +3 more sources
An anonymous batch handover authentication protocol for big flow wireless mesh networks
Wireless mesh network (WMN), as a new generation of wireless network technology, has raised increasing concerns in recent years. Due to the strong mobility nature of the clients in WMNs, the handover events frequently occur.
Dongcheng Wang +3 more
doaj +1 more source
Multi-Cancer Computational Analysis Reveals Metastasis-Associated Variant of Desmoplastic Reaction Involving INHBA and THBS2 [PDF]
Despite extensive research, the details of the metastasis-associated biological mechanisms are largely unknown. Here, we analyze data from multiple cancers using a novel computational method identifying sets of genes whose coordinated overexpression ...
Dimitris Anastassiou +3 more
core +1 more source
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially when it is expected to generalize well on the skilled forgeries that are not available during the training.
Araabi, Babak N. +3 more
core +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
A Security Remote Command Control Scheme for Industrial Internet of Things [PDF]
With the increasing demand for intelligence in the industrial field, the Industrial Internet of Things(IIoT) has developed rapidly. IIoT can effectively improve process efficiency and decision quality in industrial production and has broad application ...
Jicheng CHEN, Zijian BAO, Min LUO, Debiao HE
doaj +1 more source
Identification of Bad Signatures in Batches [PDF]
The paper addresses the problem of bad signature identification in batch verification of digital signatures. The number of generic tests necessary to identify all bad signatures in a batch instance, is used to measure the efficiency of verifiers. The divide-and-conquer verifier DCV α (x,n) is defined.
Jaroslaw Pastuszak +3 more
openaire +1 more source
Functional interpretation of single cell similarity maps. [PDF]
We present Vision, a tool for annotating the sources of variation in single cell RNA-seq data in an automated and scalable manner. Vision operates directly on the manifold of cell-cell similarity and employs a flexible annotation approach that can ...
Ashuach, Tal +5 more
core
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source

