Results 61 to 70 of about 105,934 (253)

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications

open access: yesIEEE Access, 2020
The rapid development of mobile internet technology and the better availability of GPS have made mobile online social networks (mOSNs) more popular than traditional online social networks (OSNs) over the last few years.
Munmun Bhattacharya   +4 more
doaj   +1 more source

Concurrent signature without random oracles

open access: yesTheoretical Computer Science, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiao Tan, Qiong Huang, Duncan S. Wong
openaire   +1 more source

Bayesian clustering of multivariate extremes

open access: yesCanadian Journal of Statistics, EarlyView.
Abstract The asymptotic dependence structure between multivariate extreme values is fully characterized by their projections on the unit simplex. Under mild conditions, the only constraint on the resulting distributions is that their marginal means must be equal, which results in a nonparametric model that can be difficult to use in applications ...
Sonia Alouini, Anthony C. Davison
wiley   +1 more source

Environmental and local habitat variables as predictors of trophic interactions in subtidal rocky reefs along the SE Pacific coast

open access: yesEcography, EarlyView.
Temperature generally drives latitudinal patterns in the strength of trophic interactions, including consumption rates. However, local community and other environmental conditions might also affect consumption, disrupting latitudinal gradients, which results in complex large‐scale patterns.
Catalina A. Musrri   +6 more
wiley   +1 more source

Trends in marine species distribution models: a review of methodological advances and future challenges

open access: yesEcography, EarlyView.
Correlative species distribution models (SDMs) are quantitative tools in biogeography and macroecology. Building upon the ecological niche concept, they correlate environmental covariates to species presence to model habitat suitability and predict species distributions.
Moritz Klaassen   +3 more
wiley   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

‘ukbioprepr': an R package to support reproducible preparation of environmental data for biodiversity modelling in the UK

open access: yesEcography, EarlyView.
Biodiversity modelling is essential for explaining and predicting ecological responses to environmental change and assessing progress towards targets in the Kunming‐Montreal Global Biodiversity Framework (CBD 2022). The UK benefits from rich biodiversity time‐series data and numerous open‐source environmental datasets.
Charlotte Rose Rush   +3 more
wiley   +1 more source

Optimizing Electric Vehicle Charging Scheduling With Deep Q Networks and Long Short‐Term Memory‐Based Electricity and Battery State of Charge Prediction

open access: yesEnergy Science &Engineering, EarlyView.
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga   +6 more
wiley   +1 more source

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments

open access: yesIEEE Access, 2018
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy