Results 1 to 10 of about 261,477 (240)

A secure and efficient certificateless content extraction signature with privacy protection [PDF]

open access: yesPLoS ONE, 2021
Efficiency and privacy are the key aspects in content extraction signatures. In this study, we proposed a Secure and Efficient and Certificateless Content Extraction Signature with Privacy Protection (SECCESPP) in which scalar multiplication of elliptic ...
Can Zhao   +4 more
doaj   +6 more sources

Hyperspectral signature-band extraction and adaptation for sugar content prediction on Ziziphus mauritiana and Syzygium samarangense

open access: yesSmart Agricultural Technology
This study presents a feature-based domain adaptation model for refining sugar content prediction using eight signature bands extracted from hyperspectral images.
Yung-Jhe Yan   +6 more
doaj   +4 more sources

Two improved content extraction signature schemes

open access: yes网络与信息安全学报, 2017
Motivated by the idea of batch signatures,two variants of content extraction signature schemes based on commit vector and RSA respectively were presented.In the proposed schemes,the efficiency of signing and verification were improved by unifying certain
Min WANG   +3 more
doaj   +5 more sources

Hyperspectral signature-band extraction and learning: an example of sugar content prediction of Syzygium samarangense

open access: yesScientific Reports, 2023
This study proposes a method to extract the signature bands from the deep learning models of multispectral data converted from the hyperspectral data. The signature bands with two deep-learning models were further used to predict the sugar content of the
Yung-Jhe Yan   +5 more
doaj   +3 more sources

Construction of the content extraction signature scheme based on the thought of the batch scheme

open access: yes网络与信息安全学报, 2018
The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation
Zixin TANG,Xinyi HUANG
doaj   +5 more sources

Lightweight selective disclosure for verifiable documents on blockchain

open access: yesICT Express, 2021
To achieve lightweight selective disclosure for protecting privacy of document holders, we propose an XML format for documents that can hide arbitrary elements using a cryptographic hash function and salts, which allows to be partially digitally signed ...
Kenji Saito, Satoki Watanabe
doaj   +1 more source

Extracts from Chlorella vulgaris Protect Mesenchymal Stromal Cells from Oxidative Stress Induced by Hydrogen Peroxide

open access: yesPlants, 2023
Microalgae as unicellular eukaryotic organisms demonstrate several advantages for biotechnological and biological applications. Natural derived microalgae products demand has increased in food, cosmetic and nutraceutical applications lately.
Maria G. Savvidou   +8 more
doaj   +1 more source

DoWitcher: Effective Worm Detection and Containment in the Internet Core [PDF]

open access: yes, 2007
Enterprise networks are increasingly offloading the responsibility for worm detection and containment to the carrier networks. However, current approaches to the zero-day worm detection problem such as those based on content similarity of packet payloads
Cruz, R.   +5 more
core   +2 more sources

Highlighting the effects of co‐eluting interferences on compound specific stable isotope analysis of polycyclic aromatic hydrocarbons using comprehensive two‐dimensional gas chromatography [PDF]

open access: yes, 2014
Accuracy is the most important issue when carrying out compound specific stable isotope analysis of polycyclic aromatic hydrocarbons extracted from complex samples.
Blessing   +16 more
core   +1 more source

Prediction of thermal maturity by indirect methods using seismic attributes in the central part of the Persian Gulf [PDF]

open access: yesJournal of Stratigraphy and Sedimentology Researches, 2023
In this paper, a method is proposed for the prediction of thermal maturity in the source rock using indirect methods. The applied data are well logs (neutron, density, resistance, and acoustic) in 13 wells and seismic data in six oil and gas fields in ...
Elnaz Aliakbardoust   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy