Results 71 to 80 of about 156,809 (179)
Improvement in RSA Cryptosystem
Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance.
Seema Verma, Deepak Garg
doaj +1 more source
As an emerging application of smart healthcare, mobile healthcare crowd sensing (MHCS) has become a research hotspot. However, how to ensure the confidentiality and integrity of data and protect the privacy of user is still a challenge for MHCS.
Wenming Wang +3 more
doaj +1 more source
Mini-Batch Robustness Verification of Deep Neural Networks
Neural network image classifiers are ubiquitous in many safety-critical applications. However, they are susceptible to adversarial attacks. To understand their robustness to attacks, many local robustness verifiers have been proposed to analyze є-balls of inputs.
Saar Tzour-Shaday, Dana Drachsler-Cohen
openaire +2 more sources
Group-Signature and Group Session Key Combined Safety Message Authentication Protocol for VANETs
Anonymous authentication has significant contribution to privacy protection in safety message dissemination for Vehicular Ad Hoc Networks (VANETs); however, it suffers from heavy workload of vehicle revocation check and message signature verification ...
Chunhua Zhang +4 more
doaj +1 more source
Light-weight Metal-rubber Bushing for Rolling Stock
One kind of light-weight metal-rubber bushing of four rod couplings was introduced, which reduced weight by using thealuminum. Through FEA calculation, pre-compression verification, fatigue test, and a little batch production verification, the ...
LI Gang, SUN Haiyan
doaj
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network, so it has promoted the applications of crowd-sensing services in different fields, but also brings more privacy security challenges, the ...
Xu Li +3 more
doaj +1 more source
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems
Due to the increasing usage of machine learning (ML) techniques in security- and safety-critical domains, such as autonomous systems and medical diagnosis, ensuring correct behavior of ML systems, especially for different corner cases, is of growing ...
Cao, Yinzhi +3 more
core
Attribute-based bilateral access control scheme for cloud storage
In the existing cloud storage systems, the fine grained and bilateral access control schemes suffer from weak security model and unverifiable outsourced decryption result.
LI Qi +5 more
doaj
Signcryption with Batch Verification
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
Background The exponential growth of scientific publications poses a formidable challenge for researchers seeking to validate emerging hypotheses or synthesize existing evidence.
Brice Edelman, Jeffrey Skolnick
doaj +1 more source

