Results 71 to 80 of about 1,436,143 (281)

A Light-Weight Group Signature Scheme for Wireless Networks Based-on BBS Short Group Signature [PDF]

open access: yes
In the natural context of wireless network environment, the communications between wireless nodes are more easily observed for the goal of the network traffic analysis.
Amang, Sudarsono, Mike , Yuliana
core  

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Efficient group signature scheme with revocation

open access: yesTongxin xuebao, 2016
A group signature scheme which combines the subset cover framework with Camenisch-Stadler scheme was proposed.This scheme allowed any group members’ entrance and revocation without changing other members’ secret key.Meanwhile,the scheme added a knowledge
Hong ZHONG   +3 more
doaj   +2 more sources

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

Botnet detecting method based on group-signature filter

open access: yesTongxin xuebao, 2010
A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the ...
WANG Jin-song1, LIU Fan1, ZHANG Jian3
doaj  

Secure Obfuscation for Encrypted Group Signatures

open access: yesPLOS ONE, 2015
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is
Yang Shi   +3 more
openaire   +4 more sources

Quasi-Efficient Revocation of Group Signatures [PDF]

open access: yes, 2003
A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated trusted entity can reveal the identity of the signer. Group signatures are claimed to have many useful applications such as voting and electronic cash.
ATENIESE, GIUSEPPE   +2 more
openaire   +1 more source

Hyperosmotic stress induces PARP1‐mediated HPF1‐dependent mono(ADP‐ribosyl)ation

open access: yesFEBS Letters, EarlyView.
Sorbitol‐induced hyperosmotic stress rapidly induces reversible mono(ADP‐ribosyl)ation (MARylation) on PARP1 without the signs of genotoxic signaling. We show that PARP1 autoMARylation is HPF1 dependent and forms hydroxylamine‐resistant O‐glycosidic linkages.
Anna Georgina Kopasz   +11 more
wiley   +1 more source

New solution scheme for the member revocation in group signature

open access: yesTongxin xuebao, 2014
In order to solve the problem that Camenisch-Stadler's group signature scheme could not revoke members,a new revocation scheme based on the Camenisch-Stadler's group scheme was proposed,allowing the group manager to add new members or revoke old members ...
De-dong ZHANG   +3 more
doaj  

Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature

open access: yesIEEE Access, 2017
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue.
Wei Feng, Zheng Yan, Haomeng Xie
doaj   +1 more source

Home - About - Disclaimer - Privacy