Results 61 to 70 of about 6,908 (279)
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
The rapid development of mobile internet technology and the better availability of GPS have made mobile online social networks (mOSNs) more popular than traditional online social networks (OSNs) over the last few years.
Munmun Bhattacharya+4 more
doaj +1 more source
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo+2 more
doaj +1 more source
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC.
Mingxin Ma+4 more
doaj +1 more source
Robust multitask feature learning with adaptive Huber regressions
Abstract When data from multiple tasks have outlier contamination, existing multitask learning methods perform less efficiently. To address this issue, we propose a robust multitask feature learning method by combining the adaptive Huber regression tasks with mixed regularization. The robustification parameters can be chosen to adapt to the sample size,
Yuan Zhong, Xin Gao, Wei Xu
wiley +1 more source
ABSTRACT Nanozymes, by mimicking the catalytic sites of natural enzymes, have emerged as effective substitutes for traditional natural enzymes. However, the relationship between the physicochemical properties and activity of nanozymes is complex and nonlinear.
Guanmeng Zhang+14 more
wiley +1 more source
Temperature generally drives latitudinal patterns in the strength of trophic interactions, including consumption rates. However, local community and other environmental conditions might also affect consumption, disrupting latitudinal gradients, which results in complex large‐scale patterns.
Catalina A. Musrri+6 more
wiley +1 more source
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin+4 more
doaj +1 more source
Correlative species distribution models (SDMs) are quantitative tools in biogeography and macroecology. Building upon the ecological niche concept, they correlate environmental covariates to species presence to model habitat suitability and predict species distributions.
Moritz Klaassen+3 more
wiley +1 more source
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong+4 more
doaj +1 more source
Major Conundrums and Possible Solutions in DeFi Insurance
ABSTRACT This paper empirically explores the early development of insurance projects in the decentralised finance (DeFi) industry, which is based on disruptive technologies like blockchain and smart contracts. A brief history of DeFi is narrated, stressing four risks of DeFi (volatility risk, cyberattack risk, liquidity risk, and regulation risk) and ...
Peng Zhou, Ying Zhang
wiley +1 more source