Results 31 to 40 of about 3,545,158 (344)

An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size

open access: yesIEEE Access, 2023
The transformative potential of blockchain technology has resulted in its widespread adoption, bringing about numerous advantages such as enhanced data integrity, transparency, and decentralization.
Khaled Chait   +5 more
doaj   +1 more source

Extending the Liaison Workflow Model and Engine to Support Different Signature Purposes [PDF]

open access: yes, 1999
Currently, many software systems are developed in offices geographically distributed in different locations. Furthermore, it is also common for a software system development project to contract to different software houses.
Hui, LCK, Leung, KRPH, Tang, RWM
core   +1 more source

New number-theoretic cryptographic primitives

open access: yesJournal of Mathematical Cryptology, 2020
This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the ...
Brier Éric   +3 more
doaj   +1 more source

MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture

open access: yesIEEE Access, 2021
Due to globalization and worldwide connectivity, multimedia data exchange has increased significantly over the Internet in the last decade. The life cycle of multimedia content is also getting more multifaceted as more people are accessing, sharing ...
Abdullah Ayub Khan   +4 more
doaj   +1 more source

Searchable Signatures: Context and the Struggle for Recognition [PDF]

open access: yes, 2013
Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.” These tags move beyond the descriptive and act as means for users to assert online individual and group identities.
Schlesselman-Tarango, Gina
core   +2 more sources

Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding

open access: yesНаука. Инновации. Технологии, 2022
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov   +2 more
doaj  

The impact of site-specific digital histology signatures on deep learning model accuracy and bias

open access: yesNature Communications, 2021
The Cancer Genome Atlas (TCGA) is one of the largest biorepositories of digital histology. Deep learning (DL) models have been trained on TCGA to predict numerous features directly from histology, including survival, gene expression patterns, and driver ...
F. Howard   +12 more
semanticscholar   +1 more source

Orthogonal Latin square theory based group and batch verification for digital signatures

open access: yesTongxin xuebao, 2022
In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of ...
Hong WANG   +3 more
doaj   +2 more sources

Efficient proxy ring signature for VANET

open access: yesThe Journal of Engineering, 2019
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu   +4 more
doaj   +1 more source

New DoS Defense Method Based on Strong Designated Verifier Signatures

open access: yesSensors, 2018
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin.
Marcone Pereira de Almeida   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy