Results 231 to 240 of about 80,415 (263)
Complete closure of a large gastric defect after endoscopic submucosal dissection by double-layered suturing using wide-opening reopenable clips. [PDF]
Takahashi Y +6 more
europepmc +1 more source
Patient experiences of occupational formulation: It's about getting to know me. [PDF]
Mynard L +3 more
europepmc +1 more source
Forward-Security in Private-Key Cryptography [PDF]
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Practical Forward-Secure DualRing
2023Ring signature allows a signer to generate a signature on behalf of a set of public keys, while a verifier can verify the signature without identifying who the actual signer is. In Crypto 2021, Yuen et al. proposed a new type of ring signature scheme called DualRing. However, it lacks forward security.
Li, Nan +4 more
openaire +3 more sources
Forward Secure Fuzzy Extractors [PDF]
Computer ScienceMaster of Science (M.Sc.
Goldenberg, David
openaire +3 more sources
Forward-secure ID based digital signature scheme with forward-secure private key generator
Information Sciences, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hyunok Oh, Jihye Kim, Ji Sun Shin
openaire +1 more source
Forward-Secure Certificate-Based Encryption
2009 Fifth International Conference on Information Assurance and Security, 2009Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE) and identity based encryption (IBE). CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem in traditional PKI ...
Yang Lu, Jiguo Li
openaire +1 more source
Forward-Secure Multi-signatures
2008In many applications a document needs to be signed by more than one signer. When a signature depends on more than one signer we call it a multi-signature. Further, ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy.
N. R. Sunitha, B. B. Amberker
openaire +1 more source

