Results 31 to 40 of about 120,111 (165)
Gil-Alana et al. (Physica A: 396, 42-50, 2014) compared the sunspot number record and the temperature record and found that they differ: the sunspot number record is characterized by a dominant 11-year cycle while the temperature record appears to be ...
Scafetta, Nicola
core +1 more source
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita +3 more
core
Revocable identity-based proxy re-signature scheme in the standard model
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable ...
Xiaodong YANG +4 more
doaj +2 more sources
The widespread use of smart devices attracts much attention on the research for a mobile payment protocol in the context of the Internet of Things (IoT).
Yanan Chen +3 more
doaj +1 more source
Proxy Re-signature Schemes Without Random Oracles [PDF]
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005.
Jun Shao +3 more
openaire +1 more source
Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain
To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and ...
Xiaodong YANG +4 more
doaj +2 more sources
Observation and Characterization of a Cosmic Muon Neutrino Flux from the Northern Hemisphere using six years of IceCube data [PDF]
The IceCube Collaboration has previously discovered a high-energy astrophysical neutrino flux using neutrino events with interaction vertices contained within the instrumented volume of the IceCube detector.
Aartsen, M. G. +311 more
core +3 more sources
Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing
The Internet of Things (IoT) is the internetworking of terminal physical devices depends on application programming interfaces and sensors to be connected to the Internet for collecting and exchanging data. According to the characteristics of IoT, it can
Jianhong Zhang, Wenle Bai, Yuehai Wang
doaj +1 more source
Climate Change Attribution Using Empirical Decomposition of Climatic Data
The climate change attribution problem is addressed using empirical decomposition. Cycles in solar motion and activity of 60 and 20 years were used to develop an empirical model of Earth temperature variations.
Loehle, Craig, Scafetta, Nicola
core +1 more source
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform [PDF]
Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks.
Bessani, Alysson +2 more
core +1 more source

