Results 31 to 40 of about 138,426 (219)
Seismic sensitivity to sub-surface solar activity from 18 years of GOLF/SoHO observations [PDF]
Solar activity has significantly changed over the last two Schwabe cycles. After a long and deep minimum at the end of Cycle 23, the weaker activity of Cycle 24 contrasts with the previous cycles.
Garcia, R. A. +2 more
core +3 more sources
Proxy Signatures Secure Against Proxy Key Exposure [PDF]
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure
Jacob C. N. Schuldt +2 more
openaire +1 more source
CoRoT reveals a magnetic activity cycle in a Sun-like star [PDF]
The 11-year activity cycle of the Sun is a consequence of a dynamo process occurring beneath its surface. We analyzed photometric data obtained by the CoRoT space mission, showing solar-like oscillations in the star HD49933, for signatures of stellar ...
Baglin, Annie +6 more
core +5 more sources
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj +1 more source
Discovery Prospects for a Supernova Signature of Biogenic Origin
Approximately 2.8 Myr before the present our planet was subjected to the debris of a supernova explosion. The terrestrial proxy for this event was the discovery of live atoms of 60Fe in a deep-sea ferromanganese crust.
Basu +27 more
core +1 more source
An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme
Zhou’s proxy multi-signature scheme was a safe and effective scheme, but this scheme was not safety enough. In this work, security analysis was given to the scheme and results showed that the scheme was very easy aggressed by the forgery attack. The paper proposed that any attacker can sign some certain unauthorized messages after the attacker knows a ...
openaire +1 more source
Provably secure and efficient proxy signature scheme
The size of proxy signature secret key in proxy signature scheme based on lattice basis delegation in fixed di-mension or bonsai tree is greater than that of original signature secret key.
Jie ZENG, Wei NIE
doaj +2 more sources
Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj +1 more source
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal +2 more
core
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources

