Results 61 to 70 of about 105,934 (253)
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin +4 more
doaj +1 more source
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
The rapid development of mobile internet technology and the better availability of GPS have made mobile online social networks (mOSNs) more popular than traditional online social networks (OSNs) over the last few years.
Munmun Bhattacharya +4 more
doaj +1 more source
Concurrent signature without random oracles
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiao Tan, Qiong Huang, Duncan S. Wong
openaire +1 more source
Bayesian clustering of multivariate extremes
Abstract The asymptotic dependence structure between multivariate extreme values is fully characterized by their projections on the unit simplex. Under mild conditions, the only constraint on the resulting distributions is that their marginal means must be equal, which results in a nonparametric model that can be difficult to use in applications ...
Sonia Alouini, Anthony C. Davison
wiley +1 more source
Temperature generally drives latitudinal patterns in the strength of trophic interactions, including consumption rates. However, local community and other environmental conditions might also affect consumption, disrupting latitudinal gradients, which results in complex large‐scale patterns.
Catalina A. Musrri +6 more
wiley +1 more source
Correlative species distribution models (SDMs) are quantitative tools in biogeography and macroecology. Building upon the ecological niche concept, they correlate environmental covariates to species presence to model habitat suitability and predict species distributions.
Moritz Klaassen +3 more
wiley +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Biodiversity modelling is essential for explaining and predicting ecological responses to environmental change and assessing progress towards targets in the Kunming‐Montreal Global Biodiversity Framework (CBD 2022). The UK benefits from rich biodiversity time‐series data and numerous open‐source environmental datasets.
Charlotte Rose Rush +3 more
wiley +1 more source
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang +3 more
doaj +1 more source

