Results 61 to 70 of about 43,933 (259)
Cryptanalysis of the batch verifying multiple RSA digital signatures
Summary: Recently, \textit{L. Harn} [Batch verifying multiple RSA digital signatures. Electronics Letters, 32, No. 12, 1219-1220 (1998)] proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weakness in his scheme.
Hwang, Min-Shiang +2 more
openaire +2 more sources
Objective A leading cause of death among patients with scleroderma (SSc), interstitial lung disease (ILD) remains challenging to prognosticate. The discovery of biomarkers that accurately determine which patients would benefit from close monitoring and aggressive therapy would be an essential clinical tool.
Cristina M. Padilla +13 more
wiley +1 more source
Research on endogenous security data sharing mechanism of F-RAN for 6G
In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was ...
Yang LIU +3 more
doaj +2 more sources
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
New certificateless aggregate signature scheme with universal designated verifier
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU +3 more
doaj +2 more sources
Blind estimation and correction of microarray batch effect.
Microarray batch effect (BE) has been the primary bottleneck for large-scale integration of data from multiple experiments. Current BE correction methods either need known batch identities (ComBat) or have the potential to overcorrect, by removing true ...
Sudhir Varma
doaj +1 more source
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures [PDF]
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods efficiently identify non-trivial numbers of invalid signatures in batches of (potentially large) numbers of signatures.
openaire +1 more source
A buried‐junction DSPEC design is introduced that leverages cascade charge transfer to enhance efficiency, stability, and versatility. This approach facilitates effective charge transfer and minimizes recombination losses, leading to significant improvements.
Jun‐Hyeok Park +8 more
wiley +1 more source
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing ...
Yinghui ZHANG +3 more
doaj +2 more sources
Designated verifier aggregate signature scheme based on SM9
Aggregate signatures have been recognized for significantly improving signing efficiency, reducing the computational cost for signers, lowering communication costs, and better protecting the privacy of signers. Currently, many aggregate signature schemes
Jiguo LI, Chun FANG
doaj +1 more source

