Results 61 to 70 of about 671,694 (290)

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI) or identity-based cryptosystem (IBC) have been proposed in the literature; however, no certificateless short sequential (or serial ...
SK Hafizul Islam, G.P. Biswas
doaj   +1 more source

Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks

open access: yesIEEE Access, 2020
The handover authentication protocol controls the access of multiple access points in a mobile wireless network (MWN). PairHand is a handover authentication protocol that uses identity-based public key cryptography based on bilinear pairing and provides ...
Younsoo Park, Ho-Hyun Park
doaj   +1 more source

Next‐generation proteomics improves lung cancer risk prediction

open access: yesMolecular Oncology, EarlyView.
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj   +4 more
wiley   +1 more source

Distortion maps for supersingular genus two curves

open access: yesJournal of Mathematical Cryptology, 2009
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated, since the full torsion subgroup has rank 2g.
Galbraith Steven D.   +3 more
doaj   +1 more source

LINC01116, a hypoxia‐lncRNA marker of pathological lymphangiogenesis and poor prognosis in lung adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola   +12 more
wiley   +1 more source

The monodromy pairing and discrete logarithm on the Jacobian of finite graphs

open access: yesJournal of Mathematical Cryptology, 2010
Every graph has a canonical finite abelian group attached to it. This group has appeared in the literature under a variety of names including the sandpile group, critical group, Jacobian group, and Picard group.
Shokrieh Farbod
doaj   +1 more source

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using elliptic curve cryptography (ECC) have been proposed, however, these protocols do not provide adequate security and their computation costs are also relatively
SK Hafizul Islam, G.P. Biswas
doaj   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

open access: yesThe Scientific World Journal, 2014
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security ...
Ji-Jian Chin   +3 more
doaj   +1 more source

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT

open access: yesIEEE Access, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj   +1 more source

Home - About - Disclaimer - Privacy