Results 31 to 40 of about 120,111 (165)

Global temperatures and sunspot numbers. Are they related? Yes, but non linearly. A reply to Gil-Alana et al. (2014)

open access: yes, 2014
Gil-Alana et al. (Physica A: 396, 42-50, 2014) compared the sunspot number record and the temperature record and found that they differ: the sunspot number record is characterized by a dominant 11-year cycle while the temperature record appears to be ...
Scafetta, Nicola
core   +1 more source

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]

open access: yes, 2014
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita   +3 more
core  

Revocable identity-based proxy re-signature scheme in the standard model

open access: yesTongxin xuebao, 2019
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable ...
Xiaodong YANG   +4 more
doaj   +2 more sources

Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT

open access: yesIEEE Access, 2019
The widespread use of smart devices attracts much attention on the research for a mobile payment protocol in the context of the Internet of Things (IoT).
Yanan Chen   +3 more
doaj   +1 more source

Proxy Re-signature Schemes Without Random Oracles [PDF]

open access: yes, 2007
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005.
Jun Shao   +3 more
openaire   +1 more source

Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain

open access: yesTongxin xuebao, 2021
To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and ...
Xiaodong YANG   +4 more
doaj   +2 more sources

Observation and Characterization of a Cosmic Muon Neutrino Flux from the Northern Hemisphere using six years of IceCube data [PDF]

open access: yes, 2016
The IceCube Collaboration has previously discovered a high-energy astrophysical neutrino flux using neutrino events with interaction vertices contained within the instrumented volume of the IceCube detector.
Aartsen, M. G.   +311 more
core   +3 more sources

Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing

open access: yesIEEE Access, 2019
The Internet of Things (IoT) is the internetworking of terminal physical devices depends on application programming interfaces and sensors to be connected to the Internet for collecting and exchanging data. According to the characteristics of IoT, it can
Jianhong Zhang, Wenle Bai, Yuehai Wang
doaj   +1 more source

Climate Change Attribution Using Empirical Decomposition of Climatic Data

open access: yes, 2011
The climate change attribution problem is addressed using empirical decomposition. Cycles in solar motion and activity of 60 and 20 years were used to develop an empirical model of Earth temperature variations.
Loehle, Craig, Scafetta, Nicola
core   +1 more source

A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform [PDF]

open access: yes, 2017
Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks.
Bessani, Alysson   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy