Results 71 to 80 of about 1,436,143 (281)
A Light-Weight Group Signature Scheme for Wireless Networks Based-on BBS Short Group Signature [PDF]
In the natural context of wireless network environment, the communications between wireless nodes are more easily observed for the goal of the network traffic analysis.
Amang, Sudarsono, Mike , Yuliana
core
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source
Efficient group signature scheme with revocation
A group signature scheme which combines the subset cover framework with Camenisch-Stadler scheme was proposed.This scheme allowed any group members’ entrance and revocation without changing other members’ secret key.Meanwhile,the scheme added a knowledge
Hong ZHONG +3 more
doaj +2 more sources
Diversity and complexity in neural organoids
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley +1 more source
Botnet detecting method based on group-signature filter
A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the ...
WANG Jin-song1, LIU Fan1, ZHANG Jian3
doaj
Secure Obfuscation for Encrypted Group Signatures
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is
Yang Shi +3 more
openaire +4 more sources
Quasi-Efficient Revocation of Group Signatures [PDF]
A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated trusted entity can reveal the identity of the signer. Group signatures are claimed to have many useful applications such as voting and electronic cash.
ATENIESE, GIUSEPPE +2 more
openaire +1 more source
Hyperosmotic stress induces PARP1‐mediated HPF1‐dependent mono(ADP‐ribosyl)ation
Sorbitol‐induced hyperosmotic stress rapidly induces reversible mono(ADP‐ribosyl)ation (MARylation) on PARP1 without the signs of genotoxic signaling. We show that PARP1 autoMARylation is HPF1 dependent and forms hydroxylamine‐resistant O‐glycosidic linkages.
Anna Georgina Kopasz +11 more
wiley +1 more source
New solution scheme for the member revocation in group signature
In order to solve the problem that Camenisch-Stadler's group signature scheme could not revoke members,a new revocation scheme based on the Camenisch-Stadler's group scheme was proposed,allowing the group manager to add new members or revoke old members ...
De-dong ZHANG +3 more
doaj
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue.
Wei Feng, Zheng Yan, Haomeng Xie
doaj +1 more source

