Results 11 to 20 of about 3,543,901 (295)

Enabling Cloud Storage Auditing With Key-Exposure Resistance [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2015
Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client’s secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings ...
Yu, Jia   +3 more
exaly   +5 more sources

Key Protected Deputy Signature Scheme against the Deputy Signing Key Exposure

open access: yesInternational Journal of Circuits, Systems and Signal Processing, 2021
Key exposure is very harmful to a cryptographic system. To decrease the loss from the deputy signing key vulnerability in identity-based proxy signature systems, we propose the method of key protected deputy signature (IBKPDS) using the method of parallel key insulation.
Jianhong Chen, Kun Yu, Wenhao Wang
openaire   +1 more source

Detecting Key-Dependencies [PDF]

open access: yes, 1998
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposure of the long-term key may reveal the session key and hence the data ...
Dini, Gianluca   +2 more
core   +3 more sources

Visible-light-induced C–H sulfenylation of quinoxalin-2(1H)-ones with disulfides by sustainable cerium catalysis

open access: yesGreen Synthesis and Catalysis, 2023
Using visible light as energy to form free radicals has important synthetic value. A novel and efficient visible-light-mediated strategy has been developed for the generation of thiobenzene radicals through cerium-catalyzed activation of the disulfides ...
Lixi Zhang   +5 more
doaj   +1 more source

Identity-based puncturable signature scheme

open access: yesTongxin xuebao, 2021
To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the ...
Dongmei YANG   +3 more
doaj  

Mechanical strength of silica fiber splices after exposure to extreme temperatures [PDF]

open access: yes, 2012
By using a combination of type-I and regenerated gratings, the mechanical strength of optical fiber splices after exposure to temperatures over 1300 C was characterized. Splice strength was found to decrease with temperature with a secondorder polynomial
Canning, John   +4 more
core   +1 more source

Uneven progress in reducing exposure to violence at home for New Zealand adolescents 2001–2012: a nationally representative cross‐sectional survey series [PDF]

open access: yes, 2018
Objective: To explore trends, and identify risk factors, that may explain changes in adolescent exposure to family violence over time.Methods: Data for this study was drawn from the Youth 2000 series of cross‐sectional surveys, carried out with New ...
Abramsky   +33 more
core   +1 more source

New, efficient and robust, fiber-based quantum key distribution schemes [PDF]

open access: yes, 2002
We present a new fiber based quantum key distribution (QKD) scheme which can be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto (IWY) [1].
Bennett   +28 more
core   +2 more sources

Chronic exposure to neonicotinoids increases neuronal vulnerability to mitochondrial dysfunction in the bumblebee (Bombus terrestris) [PDF]

open access: yes, 2015
This work was funded jointly by the Biotechnology and Biological Sciences Research Council, the Department for Environment, Food and Rural Affairs, the Natural Environment Research Council, the Scottish Government, and The Wellcome Trust, under the ...
Bollan, Karen A.   +7 more
core   +3 more sources

Bioinspired artificial spider silk photocatalyst for the high-efficiency capture and inactivation of bacteria aerosols

open access: yesNature Communications, 2023
Bioaerosol can cause the spread of disease, and therefore, capture and inactivation of bioaerosols is desirable. However, filtration systems can easily become blocked, and are often unable to inactivate the bioaerosol once it is captured.
Linghui Peng   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy