Results 101 to 110 of about 138,426 (219)

Efficient proxy ring signature for VANET

open access: yesThe Journal of Engineering, 2019
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu   +4 more
doaj   +1 more source

[[alternative]]The Design of Proxy Group-Oriented Signature Schemes with Anonymous Proxy Agent [PDF]

open access: yes
計畫編號:NSC92-2213-E032-019研究期間:200308~200407研究經費:416,000[[sponsorship ...
黃心嘉
core  

High‐Fidelity Synthetic Data Replicates Clinical Prediction Performance in a Million‐Patient Diabetes Cohort

open access: yesAdvanced Science, EarlyView.
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño   +5 more
wiley   +1 more source

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

open access: yes, 2011
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar   +3 more
core  

Cryptanalysis of LKK Proxy Signature [PDF]

open access: yes, 2006
A strong proxy signature scheme [7] based on Schnorr’s scheme was proposed by B. Lee et al. in 2001. In this paper we show that in the forementioned scheme, original signer may misuse a proxy signer’s signature of a message M to forge the proxy signer’s normal signature of M.
Zheng Dong, Liu Shengli, Chen Kefei
openaire   +1 more source

Structural Eigenmodes of the Brain to Improve the Source Localization of EEG: Application to Epileptiform Activity

open access: yesAdvanced Science, EarlyView.
Geometry and connectivity are complementary structures, which have demonstrated their ability to represent the brain's functional activity. This study evaluates geometric and connectome eigenmodes as biologically informed constraints for EEG source localization.
Pok Him Siu   +6 more
wiley   +1 more source

Universality of a mesenchymal transition signature in invasive solid cancers [PDF]

open access: yes, 2012
In this brief communication, additional computational validation is provided consistent with the unifying hypothesis that a shared biological mechanism of mesenchymal transition, reflected by a precise gene expression signature, may be present in all ...
Dimitris Anastassiou
core   +1 more source

Factoring based proxy signature schemes

open access: yesJournal of Computational and Applied Mathematics, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xue, Qingshui, Cao, Zhenfu
openaire   +1 more source

Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain

open access: yesAdvanced Science, EarlyView.
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio   +3 more
wiley   +1 more source

Revocable identity-based proxy re-signature against signing key exposure.

open access: yesPLoS ONE, 2018
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key.
Xiaodong Yang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy