Results 101 to 110 of about 158,618 (286)
Cryptanalysis of LKK Proxy Signature [PDF]
A strong proxy signature scheme [7] based on Schnorr’s scheme was proposed by B. Lee et al. in 2001. In this paper we show that in the forementioned scheme, original signer may misuse a proxy signer’s signature of a message M to forge the proxy signer’s normal signature of M.
Zheng Dong, Liu Shengli, Chen Kefei
openaire +1 more source
Bacterial α‐diversity decreases, but stochasticity and community stability increase across the 15 m‐depth vertical profiles and along the degraded gradient within the active layer. The abundance and interaction of core taxa mainly control community stability in the active and permafrost layers, respectively.
Shengyun Chen +13 more
wiley +1 more source
Factoring based proxy signature schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xue, Qingshui, Cao, Zhenfu
openaire +1 more source
Dietary habits play a key role in chronic diseases, and higher annual consumption of fruit and vegetable may lower risk of dementia. Artificial intelligence predicts the lipid‐like compound α‐Amyrin (αA) from plants with edible peels as a drug candidate against Alzheimer's disease.
Shu‐Qin Cao +36 more
wiley +1 more source
SiCmiR Atlas: Single‐Cell miRNA Landscape Reveals Hub‐miRNA and Network Signatures in Human Cancers
SiCmiR predicts mature miRNA activity at single‐cell resolution using only 977 landmark genes, enabling scalable reconstruction of miRNA landscapes across diverse tissues and disease contexts. The SiCmiR Atlas integrates 9.36 million cells with analytical tools for hub‐miRNA discovery, biomarker prioritization, and regulatory network interrogation ...
Xiao‐Xuan Cai +12 more
wiley +1 more source
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold ...
Ming XU, Xuru LI, Chaobin LIU, Yao MA
doaj +2 more sources
A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar +3 more
core
Resorbable impedance sensors are successfully implanted into porcine small intestinal anastomoses. Impedance was recorded for 2 hours prior, and 2 hours following ischemia induction, and a significant drop in tissue impedance was observed. Abstract Anastomotic failure remains one of the most severe complications in gastrointestinal surgery.
Dennis Wahl +12 more
wiley +1 more source
[[alternative]]The Design of Group-Oriented Proxy Signature Schemes and Proxy Authenticated Encryption Shcemes (II) [PDF]
計畫編號:NSC90-2213-E032-025研究期間:200108~200207研究經費:318,000[[sponsorship ...
黃心嘉
core
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source

