Results 21 to 30 of about 156,809 (179)

Strongly Secure Certificateless Signature Scheme Supporting Batch Verification [PDF]

open access: yesMathematical Problems in Engineering, 2014
We propose a strongly secure certificateless signature scheme supporting batch verification, which makes it possible for a verifier to verify a set of signatures more efficiently than verifying them one by one. In an identity‐based digital signature scheme, private key generator (PKG) knows each user′s signing key, so it can generate a signature which ...
Chun-I Fan, Pei-Hsiu Ho, Yi-Feng Tseng
openaire   +3 more sources

Analysis and Kinetics of the Sequencing Batch Reactors [PDF]

open access: yes, 2007
Fundamental analysis and kinetics of treatment reactors are major topics in environmental engineering literature. These fundamental topics in reactor processes are well known for the ideal batch reactor, the continuous stirred tank reactor, and the plug ...
Ndon, Udeme J
core   +2 more sources

Group Testing and Batch Verification [PDF]

open access: yes, 2010
We observe that finding invalid signatures in batches of signatures that fail batch verification is an instance of the classical group testing problem. We survey relevant group testing techniques, and present and compare new sequential and parallel algorithms for finding invalid signatures based on group testing algorithms.
Gregory M. Zaverucha, Douglas R. Stinson
openaire   +1 more source

Doppelgänger spotting in biomedical gene expression data

open access: yesiScience, 2022
Summary: Doppelgänger effects (DEs) occur when samples exhibit chance similarities such that, when split across training and validation sets, inflates the trained machine learning (ML) model performance.
Li Rong Wang   +2 more
doaj   +1 more source

Verification and Optimization of a PLC Control Schedule [PDF]

open access: yes, 2000
We report on the use of the SPIN model checker for both the verification of a process control program and the derivation of optimal control schedules.
A. Fehnker   +7 more
core   +2 more sources

Sistem Verifikasi Kekerabatan berbasis 3D ResNet-18 menggunakan Jetson Nano

open access: yesJurnal Elkomika, 2023
ABSTRAK Verifikasi kekerabatan berbasis citra wajah merupakan salah satu penerapan sistem Artificial Intelligence yang berguna dalam kehidupan, misalnya untuk penyelidikan kriminal, analisis silsilah, dan lainnya.
FAUZAN AWWAL MUKHRODI   +3 more
doaj   +1 more source

Efficient Certificateless Aggregate Signcryption Scheme with Public Verifiability [PDF]

open access: yesJisuanji gongcheng, 2022
Signcryption technology is the foundation of building a network trust system, which can ensure the confidentiality, integrity and verifiability of data.However, when a large number of users perform signcryption at the same time, the verification takes a ...
CHEN Hong, HOU Yuting, GUO Pengfei, ZHOU Mo, ZHAO Jufang, XIAO Chenglong
doaj   +1 more source

A Secure and Efficient Group Key Agreement Scheme for VANET

open access: yesSensors, 2019
A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake).
Lianhai Liu   +3 more
doaj   +1 more source

CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing

open access: yesIEEE Access, 2019
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu   +3 more
doaj   +1 more source

CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification

open access: yesJOIV: International Journal on Informatics Visualization, 2023
Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high.
Wifda Muna Fatihia   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy