Results 61 to 70 of about 138,426 (219)
Short Proxy Signature Scheme with Provable Security [PDF]
In order to avoid network congestion,and reduce the data flow,based on bilinear mapping,this paper proposes short proxy signature scheme with only one group element,including the signature definition,the construction of new scheme and the security ...
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
ABSTRACT Objective Onasemnogene abeparvovec (OA) is an AAV9‐based gene therapy for spinal muscular atrophy type I (SMA I). Real‐world outcomes show increased response variability compared to clinical trials, and follow‐up data beyond 12–18 months are limited.
Marika Pane +43 more
wiley +1 more source
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita +3 more
core
Gil-Alana et al. (Physica A: 396, 42-50, 2014) compared the sunspot number record and the temperature record and found that they differ: the sunspot number record is characterized by a dominant 11-year cycle while the temperature record appears to be ...
Scafetta, Nicola
core +1 more source
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez +12 more
wiley +1 more source
Partially blind proxy re-signature scheme with proven security
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG +5 more
doaj +2 more sources
Rheumatologic Manifestations of Patients With Type B Insulin Resistance
Objective The objectives of this study were to identify laboratory and clinical features associated with type B insulin resistance (TBIR), a rare condition caused by autoantibodies that inhibit the insulin receptor, most frequently occurring in the setting of systemic lupus erythematosus (SLE), and to increase awareness of this rare, life‐threatening ...
S. Amara Ogbonnaya +4 more
wiley +1 more source
This study presents an infrared monitoring approach for direct laser interference patterning (DLIP) combined with a convolutional neural network (CNN). Thermal emission data captured during structuring are used to predict surface topography parameters.
Lukas Olawsky +5 more
wiley +1 more source
Proxy Signature with Revocation
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer or a group of proxy signers who can then sign documents on behalf of the original signer.
Xu, Shengmin +3 more
openaire +3 more sources

