Results 41 to 50 of about 1,471,228 (283)
An RFID Grouping-proof Protocol with Privacy Protection and Forward Security [PDF]
The Radio Frequency Identification(RFID) grouping-proof protocol is used to verify whether there are multiple tags,because in actual scenario,these tags are used for the identification of one object.However,due to the simple structure and limited ...
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan
doaj +1 more source
Market Power and Technological Bias: The Case of Electricity Generation [PDF]
It is difficult to elminated all market power in electricity markets and it is therefore frequently suggested that some market power should be tolerated: extra revenues contribute to fixed cost recovery,facilitate investment and increase security of ...
Neuhoff, Karsten, Twomey, Paul
core +2 more sources
On Forward-Secure Storage [PDF]
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire +1 more source
A Forward-Secure Signature with Backward-Secure Detection [PDF]
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire +1 more source
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
Design and analysis of group key exchange protocols [PDF]
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core +1 more source
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio +46 more
core +2 more sources
Associations of Rheumatoid Arthritis Disease Activity with Frailty Over Five Years of Follow‐up
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis registry enrolled from 2003 to 2022 were included. The exposure was RA disease activity measured by Disease Activity Score in 28‐joints (DAS28)
Courtney N. Loecker +14 more
wiley +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy.
John Kelsey +2 more
doaj +1 more source

