Results 111 to 120 of about 120,111 (165)
TREM2 expression level is critical for microglial state, metabolic capacity and efficacy of TREM2 agonism. [PDF]
Feiten AF +40 more
europepmc +1 more source
Proxy, nurse, and physician needs regarding advance care planning by proxy for aged care residents lacking decision making capacity: an exploratory study. [PDF]
Jones L +5 more
europepmc +1 more source
Transcription start sites experience a high influx of heritable variants fueled by early development. [PDF]
Cortés Guzmán M +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2008 IEEE International Performance, Computing and Communications Conference, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Piyi, Cao, Zhenfu, Dong, Xiaolei
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Piyi, Cao, Zhenfu, Dong, Xiaolei
openaire +2 more sources
Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
Proceedings of the 12th International Conference on Security and Cryptography, 2015Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy recryptography controlling ...
Guhan Balasubramanian, S. Sree Vivek
openaire +1 more source
Server-Aided Verification Proxy Re-signature
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing.
Zhiwei Wang, Wei Lv
openaire +1 more source
Unidirectional Identity-Based Proxy Re-Signature
2011 IEEE International Conference on Communications (ICC), 2011To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only a few schemes. None of these schemes is unidirectional identity-based proxy re-signature, where a semi-trusted proxy can transform a signature under an identity to another signature under another identity on the same message, while the proxy ...
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire +1 more source
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Journal of Computer and System Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Wenbin +5 more
openaire +2 more sources

