Results 231 to 240 of about 1,471,228 (283)
Mechanical Performance of Nonabsorbable Monofilament Suture Materials Tied with Different Suturing Techniques Under Various Knot Configurations: An In Vitro Study. [PDF]
Taysi NM +3 more
europepmc +1 more source
Building centaur responders: is emergency management ready for artificial intelligence? [PDF]
Whyte C, Haupt B'.
europepmc +1 more source
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Forward-secure identity-based signature: Security notions and construction
Information Sciences, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu, Jia +5 more
openaire +4 more sources
A Practical Forward-Secure DualRing
2023Ring signature allows a signer to generate a signature on behalf of a set of public keys, while a verifier can verify the signature without identifying who the actual signer is. In Crypto 2021, Yuen et al. proposed a new type of ring signature scheme called DualRing. However, it lacks forward security.
Li, Nan +4 more
openaire +3 more sources
Forward Security with Crash Recovery for Secure Logs
ACM Transactions on Privacy and Security, 2023Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering to prevent subtle attacks leaving the system in an inconsistent state with inconclusive evidence. We propose new techniques combining forward
Erik-Oliver Blass, Guevara Noubir
openaire +1 more source
FAS: Forward secure sequential aggregate signatures for secure logging
Information Sciences, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jihye Kim, Hyunok Oh
openaire +2 more sources

