Results 51 to 60 of about 120,111 (165)

A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments [PDF]

open access: yesSymmetry, 2018
With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure a user’s privacy when his/her messages are routed via an untrusted intermediate device.
Xiao-Dong Yang   +3 more
openaire   +2 more sources

Discovery Prospects for a Supernova Signature of Biogenic Origin

open access: yes, 2011
Approximately 2.8 Myr before the present our planet was subjected to the debris of a supernova explosion. The terrestrial proxy for this event was the discovery of live atoms of 60Fe in a deep-sea ferromanganese crust.
Basu   +27 more
core   +1 more source

Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile Applications

open access: yes, 2018
Reducing network latency in mobile applications is an effective way of improving the mobile user experience and has tangible economic benefits. This paper presents PALOMA, a novel client-centric technique for reducing the network latency by prefetching ...
Mickens James W   +6 more
core   +1 more source

CME Expansion as the Driver of Metric Type II Shock Emission as Revealed by Self-Consistent Analysis of High Cadence EUV Images and Radio Spectrograms

open access: yes, 2013
On 13 June 2010, an eruptive event occurred near the solar limb. It included a small filament eruption and the onset of a relatively narrow coronal mass ejection (CME) surrounded by an extreme ultraviolet wave front recorded by the Solar Dynamics ...
Caroubalos, C.   +8 more
core   +1 more source

Proxy re-signature Scheme Based on Quadratic Residues

open access: yesJournal of Networks, 2011
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi trusted proxy acts as a translator between Alice and Bob. The proxy re-signature schemes can be applied in many applications. However, the existing proxy re-signature schemes were all based on Diffie-Hellman assumption.
Yuqiao Deng, Ge Song
openaire   +1 more source

Securing Information-Centric Networking without negating Middleboxes

open access: yes, 2017
Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN.
Fotiou, Nikos   +2 more
core   +1 more source

Blockchain-Based Framework for Enhancing Interoperability and Security in EHR Exchange Using Lightweight ECC Proxy Re-Encryption

open access: yesActa Informatica Pragensia
Background: The sharing of electronic health records among hospitals is crucial for ensuring consistent patient treatment. However, the process remains challenging due to the existence of varied systems, privacy concerns and interoperability issues.
Devaramane Yogaraj Ashwini   +1 more
doaj   +1 more source

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

open access: yes, 2011
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar   +3 more
core  

Compressively Sensed Image Recognition

open access: yes, 2018
Compressive Sensing (CS) theory asserts that sparse signal reconstruction is possible from a small number of linear measurements. Although CS enables low-cost linear sampling, it requires non-linear and costly reconstruction. Recent literature works show
Aslan, Sinem   +4 more
core   +1 more source

Enabling the Internet White Pages Service -- the Directory Guardian [PDF]

open access: yes, 1998
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database.
Chadwick, David W., Young, Andrew J.
core  

Home - About - Disclaimer - Privacy