Results 221 to 230 of about 36,354 (259)
Some of the next articles are maybe not open access.
Model-based verification of batch process control software
Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 2002The paper describes an approach to verify control software for batch processes. We look at logic controller programs specified as sequential function charts (SFCs). The basis of the verification is a Boolean condition/event (BC/E) model of the uncontrolled behavior of the batch plant.
S. Kowalewski +2 more
openaire +1 more source
Batch verification of Digital Signatures: Approaches and challenges
Journal of Information Security and Applications, 2017Abstract Digital Signatures can be considered analogous to an ordinary handwritten signature for signing messages in the Digital world. Digital signature must be unique and exclusive for each signer. Multiple Digital Signatures signed by either single or multiple signers can be verified at once through Batch Verification.
Apurva S. Kittur, Alwyn Roshan Pais
openaire +1 more source
Efficient Self-certified Signatures with Batch Verification
2012To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the problem of key escrow in identity-based cryptography, the concept of self-certified public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing
Li, Nan, Mu, Yi, Susilo, Willy
openaire +1 more source
Trade-off between signature aggregation and batch verification
2013 36th International Conference on Telecommunications and Signal Processing (TSP), 2013The paper deals with optimization techniques of digital signatures applied in information and communication architectures. The techniques called the signature aggregation and batch verification cause two contrary benefits: small computational overhead or small communication overhead, shorter chain of signatures or faster verification process ...
Lukas Malina, Jan Hajny, Vaclav Zeman
openaire +1 more source
Closed operation of multivessel batch distillation: Experimental verification
AIChE Journal, 2000AbstractThe multivessel batch distillation column, as well as conventional batch distillation, can be operated in a closed (total reflux) mode where the products are collected in vessels along the column. A previously proposed and simulated feedback control strategy for the closed operation is to indirectly adjust the vessel holdups by using the reflux
Bernd Wittgens, Sigurd Skogestad
openaire +1 more source
Lenient/Strict Batch Verification in Several Groups
2001Batch verification is a useful tool in verifying a large number of cryptographic items all at one time. It is especially effective in verifying predicates based on modular exponentiation. In some cases, however, the items can be incorrect although they pass batch verification together. Such leniency can be eliminated by checking the domain of each item
Fumitaka Hoshino +2 more
openaire +1 more source
Revocable ID-based Signature Scheme with Batch Verifications
2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012Signature scheme is one of important primitives in modern cryptography, which may offer functionalities of user identification, non-repudiation, and message authentication. With the advent of identity (ID)-based public key system (IDPKS) with bilinear pairings, many cryptographic schemes and protocols based on the IDPKS system have been proposed ...
Tsu-Yang Wu +2 more
openaire +1 more source
An efficient identity-based signature scheme with batch verifications
Proceedings of the 1st international conference on Scalable information systems - InfoScale '06, 2006Mapping messages or a user's identity into a point on elliptic curves is required by many pairing-based cryptographic schemes. In most of pairing-based schemes, this requirement is realized by a special hash function, MapToPoint function. However, the efficiency of the MapToPoint function is much lower than the general hash functions. In this paper, we
Shi Cui, Pu Duan, Choong Wah Chan
openaire +1 more source
Concurrent-secure anonymous fingerprinting scheme supporting batch verification
2011 IEEE International Conference on Computer Science and Automation Engineering, 2011Anonymous fingerprinting schemes are a cryptographic method for enforcing copyright protection. To date, because of certain obstacles that stand in the way of design, few desirable anonymous fingerprinting schemes based on group signature have been proposed, except for Camenisch's work in ASIACRYPT 2000.
openaire +1 more source
Batch ZK Proof and Verification of OR Logic
2009When multiple knowledge statements linked with "OR" logic have to be proved and verified, the existing solution is the proof technique by Cramer et al , in which multiple proof and verification protocols are performed in parallel. It is pointed out in this paper that the highly strong soundness in Cramer et al's solution is only theoretically valuable ...
Kun Peng, Feng Bao
openaire +1 more source

