Results 101 to 110 of about 138,426 (219)
Efficient proxy ring signature for VANET
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu +4 more
doaj +1 more source
[[alternative]]The Design of Proxy Group-Oriented Signature Schemes with Anonymous Proxy Agent [PDF]
計畫編號:NSC92-2213-E032-019研究期間:200308~200407研究經費:416,000[[sponsorship ...
黃心嘉
core
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar +3 more
core
Cryptanalysis of LKK Proxy Signature [PDF]
A strong proxy signature scheme [7] based on Schnorr’s scheme was proposed by B. Lee et al. in 2001. In this paper we show that in the forementioned scheme, original signer may misuse a proxy signer’s signature of a message M to forge the proxy signer’s normal signature of M.
Zheng Dong, Liu Shengli, Chen Kefei
openaire +1 more source
Geometry and connectivity are complementary structures, which have demonstrated their ability to represent the brain's functional activity. This study evaluates geometric and connectome eigenmodes as biologically informed constraints for EEG source localization.
Pok Him Siu +6 more
wiley +1 more source
Universality of a mesenchymal transition signature in invasive solid cancers [PDF]
In this brief communication, additional computational validation is provided consistent with the unifying hypothesis that a shared biological mechanism of mesenchymal transition, reflected by a precise gene expression signature, may be present in all ...
Dimitris Anastassiou
core +1 more source
Factoring based proxy signature schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xue, Qingshui, Cao, Zhenfu
openaire +1 more source
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
Revocable identity-based proxy re-signature against signing key exposure.
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key.
Xiaodong Yang +4 more
doaj +1 more source

