Results 31 to 40 of about 3,545,158 (344)
An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size
The transformative potential of blockchain technology has resulted in its widespread adoption, bringing about numerous advantages such as enhanced data integrity, transparency, and decentralization.
Khaled Chait +5 more
doaj +1 more source
Extending the Liaison Workflow Model and Engine to Support Different Signature Purposes [PDF]
Currently, many software systems are developed in offices geographically distributed in different locations. Furthermore, it is also common for a software system development project to contract to different software houses.
Hui, LCK, Leung, KRPH, Tang, RWM
core +1 more source
New number-theoretic cryptographic primitives
This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the ...
Brier Éric +3 more
doaj +1 more source
Due to globalization and worldwide connectivity, multimedia data exchange has increased significantly over the Internet in the last decade. The life cycle of multimedia content is also getting more multifaceted as more people are accessing, sharing ...
Abdullah Ayub Khan +4 more
doaj +1 more source
Searchable Signatures: Context and the Struggle for Recognition [PDF]
Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.” These tags move beyond the descriptive and act as means for users to assert online individual and group identities.
Schlesselman-Tarango, Gina
core +2 more sources
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov +2 more
doaj
The impact of site-specific digital histology signatures on deep learning model accuracy and bias
The Cancer Genome Atlas (TCGA) is one of the largest biorepositories of digital histology. Deep learning (DL) models have been trained on TCGA to predict numerous features directly from histology, including survival, gene expression patterns, and driver ...
F. Howard +12 more
semanticscholar +1 more source
Orthogonal Latin square theory based group and batch verification for digital signatures
In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of ...
Hong WANG +3 more
doaj +2 more sources
Efficient proxy ring signature for VANET
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu +4 more
doaj +1 more source
New DoS Defense Method Based on Strong Designated Verifier Signatures
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin.
Marcone Pereira de Almeida +3 more
doaj +1 more source

