Results 191 to 200 of about 138,426 (219)

Coherence‐Gated Wrapped‐Phase InSAR With Matrix‐Based Uncertainty Diagnostics for Burial‐Mound Hotspot Ranking (Sicily, Italy)

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT Burial mounds are key elements of Mediterranean funerary landscapes, but in intensively cultivated coastal plains their low‐relief expression is easily obscured by ploughing, levelling and rapidly changing surface conditions, making single‐date observations unreliable.
Salvatore Polverino   +2 more
wiley   +1 more source

A Metabolomic Signature Predicts Gout Flare Clinical Outcome Associated With Colchicine Prophylaxis

open access: yesArthritis &Rheumatology, EarlyView.
Objective This study investigated that serum metabolomics, before urate‐lowering therapy (ULT) initiation, could serve as a biomarker for responsiveness to colchicine prophylaxis in patients with gout commencing treat‐to‐target ULT. Methods We studied a multicenter prospective cohort (n = 409) initiating treat‐to‐target ULT plus colchicine prophylaxis.
Wenyan Sun   +13 more
wiley   +1 more source

An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature

2008 International Conference on Information Technology, 2008
Identity-based (ID based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key settings. A proxy signature is a method for an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity with in a given context.
Banshidhar Majhi   +2 more
openaire   +1 more source

Threshold Proxy Re-Signature

2008 IEEE International Performance, Computing and Communications Conference, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Piyi, Cao, Zhenfu, Dong, Xiaolei
openaire   +2 more sources

Proxy group signature: A new anonymous proxy signature scheme

2008 International Conference on Machine Learning and Cybernetics, 2008
In the proxy signature scheme, the capability of anonymous proxy is requested for protecting the proxy signerpsilas privacy. This paper introduces a concept and model of proxy group signature and constructs a proxy group signature scheme based on bilinear pairings.
null Ke-Li Wu   +3 more
openaire   +1 more source

Ring proxy signatures

Journal of Electronics (China), 2008
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei   +2 more
openaire   +1 more source

Threshold proxy signatures

IEE Proceedings - Computers and Digital Techniques, 1999
A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme.
H. -M. Sun, N. -Y. Lee, T. Hwang
openaire   +1 more source

Proxy-protected signature secure against the undelegated proxy signature attack

Computers & Electrical Engineering, 2007
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected signature schemes.
Yu-Chuan Liu   +3 more
openaire   +1 more source

Efficient Certificateless Proxy Signature Scheme

International Journal of Foundations of Computer Science, 2016
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire   +1 more source

Lattice-Based Proxy Signature

2010 International Conference on Computational Intelligence and Security, 2010
Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can’t resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack.
Yali Jiang, Fanyu Kong, Xiuling Ju
openaire   +1 more source

Home - About - Disclaimer - Privacy