Results 71 to 80 of about 4,491,165 (327)
Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj +1 more source
Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [PDF]
The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the ...
XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan
doaj +1 more source
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC.
Mingxin Ma +4 more
doaj +1 more source
Non-malleable codes for space-bounded tampering [PDF]
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio +30 more
core +2 more sources
Riemannian Geometry for the Classification of Brain States with Intracortical Brain Recordings
Geometric machine learning is applied to decode brain states from invasive intracortical neural recordings, extending Riemannian methods to the invasive regime where data is scarcer and less stationary. A Minimum Distance to Mean classifier on covariance manifolds uses geodesic distances to outperform convolutional neural networks while reducing ...
Arnau Marin‐Llobet +9 more
wiley +1 more source
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
The rapid development of mobile internet technology and the better availability of GPS have made mobile online social networks (mOSNs) more popular than traditional online social networks (OSNs) over the last few years.
Munmun Bhattacharya +4 more
doaj +1 more source
Bad oracles in higher computability and randomness [PDF]
Laurent Bienvenu +2 more
openalex +1 more source
Delegating Quantum Computation in the Quantum Random Oracle Model
A delegation scheme allows a computationally weak client to use a server's resources to help it evaluate a complex circuit without leaking any information about the input (other than its length) to the server.
A Broadbent +17 more
core +1 more source
ABSTRACT Corporate sustainability efforts increasingly emphasize Scope 3 emissions due to their substantial share of total corporate carbon footprints. However, reporting these emissions remains inconsistent, limiting transparency and comparability across firms.
Nuri C. Onat +4 more
wiley +1 more source
Improved Scheme for Data Aggregation of Distributed Oracle for Intelligent Internet of Things
Oracle is a data supply mechanism that provides real-world data for blockchain. It serves as a bridge between blockchain and the IoT world, playing a crucial role in solving problems such as data sharing and device management in the IoT field.
Ruiyang Gao +5 more
doaj +1 more source

