Results 111 to 120 of about 120,111 (165)

TREM2 expression level is critical for microglial state, metabolic capacity and efficacy of TREM2 agonism. [PDF]

open access: yesNat Commun
Feiten AF   +40 more
europepmc   +1 more source

Transcription start sites experience a high influx of heritable variants fueled by early development. [PDF]

open access: yesNat Commun
Cortés Guzmán M   +4 more
europepmc   +1 more source

Threshold Proxy Re-Signature

2008 IEEE International Performance, Computing and Communications Conference, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Piyi, Cao, Zhenfu, Dong, Xiaolei
openaire   +2 more sources

Proxy re-signatures

Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire   +2 more sources

Controlled Proxy Re-signing - Conditional Proxy Re-Signatures

Proceedings of the 12th International Conference on Security and Cryptography, 2015
Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy recryptography controlling ...
Guhan Balasubramanian, S. Sree Vivek
openaire   +1 more source

Server-Aided Verification Proxy Re-signature

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing.
Zhiwei Wang, Wei Lv
openaire   +1 more source

Unidirectional Identity-Based Proxy Re-Signature

2011 IEEE International Conference on Communications (ICC), 2011
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only a few schemes. None of these schemes is unidirectional identity-based proxy re-signature, where a semi-trusted proxy can transform a signature under an identity to another signature under another identity on the same message, while the proxy ...
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire   +1 more source

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key

Journal of Computer and System Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Wenbin   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy