Results 41 to 50 of about 1,471,228 (283)

An RFID Grouping-proof Protocol with Privacy Protection and Forward Security [PDF]

open access: yesJisuanji gongcheng, 2020
The Radio Frequency Identification(RFID) grouping-proof protocol is used to verify whether there are multiple tags,because in actual scenario,these tags are used for the identification of one object.However,due to the simple structure and limited ...
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan
doaj   +1 more source

Market Power and Technological Bias: The Case of Electricity Generation [PDF]

open access: yes, 2006
It is difficult to elminated all market power in electricity markets and it is therefore frequently suggested that some market power should be tolerated: extra revenues contribute to fixed cost recovery,facilitate investment and increase security of ...
Neuhoff, Karsten, Twomey, Paul
core   +2 more sources

On Forward-Secure Storage [PDF]

open access: yes, 2006
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire   +1 more source

A Forward-Secure Signature with Backward-Secure Detection [PDF]

open access: yes2008 International Conference on Information Security and Assurance (isa 2008), 2008
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire   +1 more source

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Design and analysis of group key exchange protocols [PDF]

open access: yes, 2010
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Associations of Rheumatoid Arthritis Disease Activity with Frailty Over Five Years of Follow‐up

open access: yesArthritis Care &Research, Accepted Article.
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis registry enrolled from 2003 to 2022 were included. The exposure was RA disease activity measured by Disease Activity Score in 28‐joints (DAS28)
Courtney N. Loecker   +14 more
wiley   +1 more source

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF

open access: yesIACR Transactions on Symmetric Cryptology
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy.
John Kelsey   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy