Results 41 to 50 of about 6,908 (279)

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

Certificateless signature scheme without random oracles

open access: yesTongxin xuebao, 2015
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj   +2 more sources

Oblivious Transfer Based on NTRUEncrypt

open access: yesIEEE Access, 2018
Oblivious transfer (OT) is the most fundamental process in cryptosystems and serves as the basic building block for implementing protocols, such as the secure multi-party computation and the fair electronic contract.
Bo Mi   +4 more
doaj   +1 more source

Relative to a random oracle, NP is not small

open access: yesProceedings of IEEE 9th Annual Conference on Structure in Complexity Theory, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kautz, Steven M., Miltersen, Peter Bro
openaire   +4 more sources

Human iPSC‐Derived Mononuclear Phagocytes Improve Cognition and Neural Health across Multiple Mouse Models of Aging and Alzheimer's Disease

open access: yesAdvanced Science, EarlyView.
Short‐term intravenous treatments with iPSC‐derived mononuclear phagocytes (iMPs) improve cognitive decline and neural health in two mouse models of aging and in the 5xFAD mouse model of Alzheimer's disease. iMPs reduce levels of serum amyloid proteins that increase in aging and improve the health of hippocampal microglia and mossy cells.
V. Alexandra Moser   +11 more
wiley   +1 more source

Query-Complexity Amplification for Random Oracles [PDF]

open access: yes, 2015
Increasing the computational complexity of evaluating a hash function, both for the honest users as well as for an adversary, is a useful technique employed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation
Demay Grégory   +3 more
openaire   +3 more sources

RESP2: An Uncertainty Aware Multi‐Target Multi‐Property Optimization AI Pipeline for Antibody Discovery

open access: yesAdvanced Science, EarlyView.
RESP2, an enhanced antibody discovery pipeline for multi‐target and multi‐property optimization, identifies antibodies with optimized developability and broad affinity to multiple antigen variants. In silico evaluation shows RESP2 outperforms leading AI methods, achieving ≥85% success rates.
Jonathan Parkinson   +3 more
wiley   +1 more source

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

open access: yesIEEE Access, 2018
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on.
Qun Lin   +5 more
doaj   +1 more source

An investigation of the price discovery role of futures markets: A dynamic time warping analysis of the United States corn markets

open access: yesAgribusiness, EarlyView.
Abstract Futures markets are critical to price discovery and often dominate spot markets. We analyze the linkages between daily corn futures and spot prices in the United States using dynamic time warping. This nonparametric pattern recognition technique has several advantages over traditional time series methods.
Dragan Miljkovic   +2 more
wiley   +1 more source

Robust design of flexible supply chains with mobile and modular facilities

open access: yesAIChE Journal, EarlyView.
Abstract Modular manufacturing is increasingly being adopted by the chemical industry in applications where resource availability and product demand are highly distributed and uncertain. Modular plants are often built such that they can be easily relocated.
Congqin Ge, Zhihong Yuan, Qi Zhang
wiley   +1 more source

Home - About - Disclaimer - Privacy