Results 21 to 30 of about 154,876 (275)

Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature

open access: yes, 2023
Synchronized aggregate signature is a special type of signature that all signers have a synchronized time period and allows aggregating signatures which are generated in the same period. This signature has a wide range of applications for systems that have a natural reporting period such as log and sensor data, or blockchain protocol.
Tezuka, Masayuki, Tanaka, Keisuke
openaire   +2 more sources

$iCLAS$ : An Improved Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Networks

open access: yesIEEE Access, 2019
As the world's population gradually enters the aging stage, the smart healthcare demand has become extremely urgent and incomparably important. Healthcare wireless sensor networks (HWSNs) is one of the foundations of smart healthcare. Medical information
Yong Xie   +3 more
doaj   +1 more source

Identification and validation of a novel signature for prediction the prognosis and immunotherapy benefit in bladder cancer [PDF]

open access: yesPeerJ, 2022
Background Bladder cancer (BC) is a common urinary tract system tumor with high recurrence rate and different populations show distinct response to immunotherapy.
Yichi Zhang   +6 more
doaj   +2 more sources

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]

open access: yes, 2014
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core   +1 more source

Universal Signature Aggregators [PDF]

open access: yes, 2015
We introduce the concept of universal signature aggregators. In a universal signature aggregator system, a third party, using a set of common reference parameters, can aggregate a collection of signatures produced from any set of signing algorithms (subject to a chosen length constraint) into one short signature whose length is independent of the ...
Susan Hohenberger   +2 more
openaire   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]

open access: yes, 2017
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou   +7 more
core   +4 more sources

Unrestricted Aggregate Signatures [PDF]

open access: yes, 2007
Secure use of the BGLS [1] aggregate signature schemes is restricted to the aggregation of distinct messages (for the basic scheme) or per-signer distinct messages (for the enhanced, prepend-public-key version of the scheme). We argue that these restrictions preclude interesting applications, make usage of the schemes error-prone and are generally ...
Mihir Bellare   +2 more
openaire   +1 more source

The Computational Magic of the Ventral Stream: Towards a Theory [PDF]

open access: yes, 2011
I conjecture that the sample complexity of object recognition is mostly due to geometric image transformations and that a main goal of the ventral stream – V1, V2, V4 and IT – is to learn-and-discount image transformations.
Tomaso A. Poggio
core   +2 more sources

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

Home - About - Disclaimer - Privacy