Results 1 to 10 of about 278,857 (261)

Secure Obfuscation for Encrypted Group Signatures. [PDF]

open access: yesPLoS ONE, 2015
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi   +3 more
doaj   +5 more sources

Lattice-based group signatures with forward security for anonymous authentication [PDF]

open access: yesHeliyon, 2023
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme.
Simin Chen, Jiageng Chen
doaj   +2 more sources

Engineered Cell Line Imaging Assay Differentiates Pathogenic from Non-Pathogenic Bacteria

open access: yesPathogens, 2022
Cell culture systems have greatly expanded our understanding of how bacterial pathogens target signaling pathways to manipulate the host and cause infection.
Shelby M. B. Phillips   +6 more
doaj   +1 more source

High-throughput functional trait testing for bacterial pathogens

open access: yesmSphere, 2023
Functional traits are characteristics that affect the fitness and metabolic function of a microorganism. There is growing interest in using high-throughput methods to characterize bacterial pathogens based on functional virulence traits.
Zachary R. Stromberg   +3 more
doaj   +1 more source

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

open access: yesCryptography, 2022
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera   +5 more
doaj   +1 more source

Proteomic Signatures of Antimicrobial Resistance in Yersinia pestis and Francisella tularensis

open access: yesFrontiers in Medicine, 2022
Antimicrobial resistance (AMR) is a well-recognized, widespread, and growing issue of concern. With increasing incidence of AMR, the ability to respond quickly to infection with or exposure to an AMR pathogen is critical. Approaches that could accurately
Brooke L. Deatherage Kaiser   +15 more
doaj   +1 more source

Attribute-based encryption schema with group signatures

open access: yes网络与信息安全学报, 2019
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is ...
Xinglan ZHANG, Yao CUI
doaj   +3 more sources

A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring

open access: yesSensors, 2020
Air quality in urban environments has become a central issue of our present society as it affects the health and lives of the population all over the world. The first step in mitigating negative effects is proper measurement of the pollution level.
Gyorgy Kolumban-Antal   +3 more
doaj   +1 more source

An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures

open access: yesIEEE Access, 2018
Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers.
Xiaohan Yue   +5 more
doaj   +1 more source

Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation

open access: yesCryptography, 2020
An efficient member revocation mechanism is a desirable feature when group signature schemes are applied in practical scenarios. Revocation methods, such as verifier-local revocation (VLR), provide an efficient member revocation in applications of group ...
Maharage Nisansala Sevwandi Perera   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy