Results 71 to 80 of about 4,491,165 (327)

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [PDF]

open access: yesJisuanji kexue
The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the ...
XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan
doaj   +1 more source

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent

open access: yesIEEE Access, 2020
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC.
Mingxin Ma   +4 more
doaj   +1 more source

Non-malleable codes for space-bounded tampering [PDF]

open access: yes, 2017
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio   +30 more
core   +2 more sources

Riemannian Geometry for the Classification of Brain States with Intracortical Brain Recordings

open access: yesAdvanced Intelligent Systems, EarlyView.
Geometric machine learning is applied to decode brain states from invasive intracortical neural recordings, extending Riemannian methods to the invasive regime where data is scarcer and less stationary. A Minimum Distance to Mean classifier on covariance manifolds uses geodesic distances to outperform convolutional neural networks while reducing ...
Arnau Marin‐Llobet   +9 more
wiley   +1 more source

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications

open access: yesIEEE Access, 2020
The rapid development of mobile internet technology and the better availability of GPS have made mobile online social networks (mOSNs) more popular than traditional online social networks (OSNs) over the last few years.
Munmun Bhattacharya   +4 more
doaj   +1 more source

Bad oracles in higher computability and randomness [PDF]

open access: green, 2021
Laurent Bienvenu   +2 more
openalex   +1 more source

Delegating Quantum Computation in the Quantum Random Oracle Model

open access: yes, 2020
A delegation scheme allows a computationally weak client to use a server's resources to help it evaluate a complex circuit without leaking any information about the input (other than its length) to the server.
A Broadbent   +17 more
core   +1 more source

Does Accounting Scope 3 Emissions Improve Sustainable Business Outcomes? Evidence From the S&P 500 Technology Companies

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Corporate sustainability efforts increasingly emphasize Scope 3 emissions due to their substantial share of total corporate carbon footprints. However, reporting these emissions remains inconsistent, limiting transparency and comparability across firms.
Nuri C. Onat   +4 more
wiley   +1 more source

Improved Scheme for Data Aggregation of Distributed Oracle for Intelligent Internet of Things

open access: yesSensors
Oracle is a data supply mechanism that provides real-world data for blockchain. It serves as a bridge between blockchain and the IoT world, playing a crucial role in solving problems such as data sharing and device management in the IoT field.
Ruiyang Gao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy