Results 31 to 40 of about 158,618 (286)
Seismic sensitivity to sub-surface solar activity from 18 years of GOLF/SoHO observations [PDF]
Solar activity has significantly changed over the last two Schwabe cycles. After a long and deep minimum at the end of Cycle 23, the weaker activity of Cycle 24 contrasts with the previous cycles.
Garcia, R. A. +2 more
core +3 more sources
Multi-use unidirectional proxy re-signatures [PDF]
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice's secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party's signing key and cannot sign arbitrary messages on behalf of Alice or Bob.
Libert, Benoît, Vergnaud, Damien
openaire +2 more sources
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
A Novel Anonymous Proxy Signature Scheme
Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders.
Jue-Sam Chou
doaj +1 more source
A Strong Proxy Signature Scheme based on Partial Delegation [PDF]
Proxy signature scheme is an extension of digital signature scheme first introduced by Mambo et al. in 1996, which allows a signer to delegate the signing capability to a designated person, called a proxy signer.
Mudgil, Pushpendra, Murmu, Chandni
core
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
Forward secure proxy signature scheme
A forward secure proxy signature scheme was proposed combining the concept of forward security with proxy signature. This means even if an adversary has gotten the current proxy signers’ key.
WANG Xiao-ming +2 more
doaj +2 more sources
Cryptanalysis of ID based Proxy-Blind signature scheme over lattice
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.
Swati Rawal, Sahadeo Padhye
doaj +1 more source
Time Stamped Proxy Blind Signature Scheme With Proxy Revocation Based on Discrete Logarithm Problem [PDF]
Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer.
Panda, Suryakanta
core
Magnetic variability in the young solar analog KIC 10644253: Observations from the Kepler satellite and the HERMES spectrograph [PDF]
The continuous photometric observations collected by the Kepler satellite over 4 years provide a whelm of data with an unequalled quantity and quality for the study of stellar evolution of more than 200000 stars.
Ballot, J. +14 more
core +5 more sources

