Results 1 to 10 of about 278,857 (261)
Secure Obfuscation for Encrypted Group Signatures. [PDF]
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi +3 more
doaj +5 more sources
Lattice-based group signatures with forward security for anonymous authentication [PDF]
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme.
Simin Chen, Jiageng Chen
doaj +2 more sources
Engineered Cell Line Imaging Assay Differentiates Pathogenic from Non-Pathogenic Bacteria
Cell culture systems have greatly expanded our understanding of how bacterial pathogens target signaling pathways to manipulate the host and cause infection.
Shelby M. B. Phillips +6 more
doaj +1 more source
High-throughput functional trait testing for bacterial pathogens
Functional traits are characteristics that affect the fitness and metabolic function of a microorganism. There is growing interest in using high-throughput methods to characterize bacterial pathogens based on functional virulence traits.
Zachary R. Stromberg +3 more
doaj +1 more source
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera +5 more
doaj +1 more source
Proteomic Signatures of Antimicrobial Resistance in Yersinia pestis and Francisella tularensis
Antimicrobial resistance (AMR) is a well-recognized, widespread, and growing issue of concern. With increasing incidence of AMR, the ability to respond quickly to infection with or exposure to an AMR pathogen is critical. Approaches that could accurately
Brooke L. Deatherage Kaiser +15 more
doaj +1 more source
Attribute-based encryption schema with group signatures
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is ...
Xinglan ZHANG, Yao CUI
doaj +3 more sources
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring
Air quality in urban environments has become a central issue of our present society as it affects the health and lives of the population all over the world. The first step in mitigating negative effects is proper measurement of the pollution level.
Gyorgy Kolumban-Antal +3 more
doaj +1 more source
Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers.
Xiaohan Yue +5 more
doaj +1 more source
Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation
An efficient member revocation mechanism is a desirable feature when group signature schemes are applied in practical scenarios. Revocation methods, such as verifier-local revocation (VLR), provide an efficient member revocation in applications of group ...
Maharage Nisansala Sevwandi Perera +1 more
doaj +1 more source

