Results 81 to 90 of about 154,933 (276)

Research on endogenous security data sharing mechanism of F-RAN for 6G

open access: yesTongxin xuebao, 2021
In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was ...
Yang LIU   +3 more
doaj   +2 more sources

Blind estimation and correction of microarray batch effect.

open access: yesPLoS ONE, 2020
Microarray batch effect (BE) has been the primary bottleneck for large-scale integration of data from multiple experiments. Current BE correction methods either need known batch identities (ComBat) or have the potential to overcorrect, by removing true ...
Sudhir Varma
doaj   +1 more source

On the Influence of Antioxidants and Recycled MgO–C Source Material on the Mechanical Properties of Carbon‐Bonded Magnesia Refractories

open access: yesAdvanced Engineering Materials, EarlyView.
The presented study focuses on the fracture behaviour of carbon‐bonded magnesia MgO–C refractories, where environmentally friendly fructose, collagen and lignin serve as temporary binding agents. The partial substitution of the source material with recycled MgO–C reduces the fracture resistance, which can be counteracted by the additional introduction ...
Marc Neumann   +6 more
wiley   +1 more source

New certificateless aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU   +3 more
doaj   +2 more sources

Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures [PDF]

open access: yes, 2009
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods efficiently identify non-trivial numbers of invalid signatures in batches of (potentially large) numbers of signatures.
openaire   +1 more source

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

open access: yes, 2011
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar   +3 more
core  

Powder Optimization Strategies for Binder Jetting Printing of BaTiO3 and Ba0,6Sr0,4TiO3 Ceramics

open access: yesAdvanced Engineering Materials, EarlyView.
Powder optimization is investigated to enable binder jetting of BaTiO3 and Ba0.6Sr0.4TiO3 ferroelectric ceramics. The antagonistic relationship between flowability and binder compatibility is addressed through binder impregnation of granulated powders and fumed silica addition to fine powders.
Fanny Pruvost   +4 more
wiley   +1 more source

Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X

open access: yesTongxin xuebao, 2023
Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing ...
Yinghui ZHANG   +3 more
doaj   +2 more sources

Designated verifier aggregate signature scheme based on SM9

open access: yes网络与信息安全学报
Aggregate signatures have been recognized for significantly improving signing efficiency, reducing the computational cost for signers, lowering communication costs, and better protecting the privacy of signers. Currently, many aggregate signature schemes
Jiguo LI, Chun FANG
doaj   +1 more source

A new batch verification scheme for ECDSA$$^*$$ signatures

open access: yesSādhanā, 2019
In this paper, we propose an efficient batch verification algorithm for ECDSA $$^*$$ (Elliptic Curve Digital Signature Algorithm) $$^*
Apurva S Kittur, Alwyn R Pais
openaire   +2 more sources

Home - About - Disclaimer - Privacy