Results 31 to 40 of about 138,426 (219)

Seismic sensitivity to sub-surface solar activity from 18 years of GOLF/SoHO observations [PDF]

open access: yes, 2015
Solar activity has significantly changed over the last two Schwabe cycles. After a long and deep minimum at the end of Cycle 23, the weaker activity of Cycle 24 contrasts with the previous cycles.
Garcia, R. A.   +2 more
core   +3 more sources

Proxy Signatures Secure Against Proxy Key Exposure [PDF]

open access: yes, 2008
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure
Jacob C. N. Schuldt   +2 more
openaire   +1 more source

CoRoT reveals a magnetic activity cycle in a Sun-like star [PDF]

open access: yes, 2010
The 11-year activity cycle of the Sun is a consequence of a dynamo process occurring beneath its surface. We analyzed photometric data obtained by the CoRoT space mission, showing solar-like oscillations in the star HD49933, for signatures of stellar ...
Baglin, Annie   +6 more
core   +5 more sources

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

Discovery Prospects for a Supernova Signature of Biogenic Origin

open access: yes, 2011
Approximately 2.8 Myr before the present our planet was subjected to the debris of a supernova explosion. The terrestrial proxy for this event was the discovery of live atoms of 60Fe in a deep-sea ferromanganese crust.
Basu   +27 more
core   +1 more source

An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme

open access: yesJournal of Networks, 2011
Zhou’s proxy multi-signature scheme was a safe and effective scheme, but this scheme was not safety enough. In this work, security analysis was given to the scheme and results showed that the scheme was very easy aggressed by the forgery attack. The paper proposed that any attacker can sign some certain unauthorized messages after the attacker knows a ...
openaire   +1 more source

Provably secure and efficient proxy signature scheme

open access: yesTongxin xuebao, 2014
The size of proxy signature secret key in proxy signature scheme based on lattice basis delegation in fixed di-mension or bonsai tree is greater than that of original signature secret key.
Jie ZENG, Wei NIE
doaj   +2 more sources

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]

open access: yes, 2007
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal   +2 more
core  

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Home - About - Disclaimer - Privacy