Results 31 to 40 of about 80,415 (263)

Efficient Anonymous Authentication for Wireless Body Area Networks

open access: yesIEEE Access, 2022
Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients
Chuang Li, Chunxiang Xu
doaj   +1 more source

On Forward-Secure Storage [PDF]

open access: yes, 2006
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire   +1 more source

Novel construction of forward-secure public-key encryption in the standard model

open access: yesTongxin xuebao, 2014
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj   +2 more sources

Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]

open access: yesJisuanji kexue yu tansuo
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj   +1 more source

Forward-Secure Edge Authentication for Graphs

open access: yesThe Computer Journal, 2021
AbstractThe edge authentication of graphs has been studied in the literature because graphs are one of the most widely used data organization structures. The majority of such schemes cannot be used to authenticate general directed graphs (GDGs); other schemes cannot be used for addressing either the issue of dynamic update or the issue of information ...
Fei Zhu   +5 more
openaire   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Forward Secure Ring Signature without Random Oracles [PDF]

open access: yes, 2011
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire   +2 more sources

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme

open access: yesIEEE Access, 2020
Aiming at reducing the local storage burden and computational costs, numerous individuals and enterprises are willing to outsource their data to the cloud server.
Haifeng Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy