Results 11 to 20 of about 1,597,742 (299)

On modular decompositions of system signatures [PDF]

open access: yesJournal of Multivariate Analysis, 2014
Considering a semicoherent system made up of $n$ components having i.i.d. continuous lifetimes, Samaniego defined its structural signature as the $n$-tuple whose $k$-th coordinate is the probability that the $k$-th component failure causes the system to ...
Barlow   +16 more
core   +7 more sources

Systemic Metabolic Signatures of Oral Diseases

open access: yesJournal of Dental Research, 2023
Systemic metabolic signatures of oral diseases have been rarely investigated, and prospective studies do not exist. We analyzed whether signs of current or past infectious/inflammatory oral diseases are associated with circulating metabolites. Two study populations were included: the population-based Health-2000 ( n = 6,229) and Parogene ( n = 452), a
A. Salminen   +10 more
openaire   +3 more sources

Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System

open access: yesMathematics, 2022
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress in healthcare detection. It is extremely important to reduce the cost of communication and ensure the authenticity and integrity of data. A
Yanyan Gu   +3 more
doaj   +1 more source

Research and Application of Cloud Digital Signature Technology [PDF]

open access: yesJisuanji gongcheng, 2017
Transmission signed file transfer of digital signature technology based on Public Key Infrastructure(PKI) is usually subject to factors such as the environment,the terminal,and the file format between the users,and the signatures between different ...
JIAN Chunfu,XIE Jihua,JIN Junhua
doaj   +1 more source

Infrared signature suppression effect of diesel engine wet exhaust system

open access: yesZhongguo Jianchuan Yanjiu, 2023
ObjectivesAs the ship side wet exhaust system is widely equipped on many stealth frigates, it is necessary to study its infrared signature suppression (IRSS) effect.MethodsIn this paper, the IRSS principle of the wet exhaust system is analyzed, a ...
Xiaoliang PU, Tao ZHONG, Yanzhen WANG
doaj   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Hidden Signature for DTW Signature Verification in Authorizing Payment Transactions

open access: yesJournal of Telecommunications and Information Technology, 2023
Traditional use of dynamic time warping for signature verification consists of forming some dissimilarity measure between the signature in question and a set of “template signatures”.
Joanna Putz-Leszczyńska   +1 more
doaj   +1 more source

The Drivers of a Digital Signature System Adoption: Evidence from Finance and Information System Departments

open access: yesJournal of Information Systems Engineering and Business Intelligence, 2022
Background: With the massive e-commerce transactions and document transfers, reliable system protection is needed. A digital signature is a tool that consists of encryption and decryption algorithms in a secret key to prevent data theft and online fraud.
Ahmad Arif Santosa, Firdaus Alamsjah
doaj   +1 more source

Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature [PDF]

open access: yesJisuanji gongcheng, 2023
To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity ...
RAO Jintao, CUI Zhe
doaj   +1 more source

Decentralized Malware Attacks Detection using Blockchain [PDF]

open access: yesITM Web of Conferences, 2023
This research introduces an approach to detect malware attacks using blockchain technology that integrates signature-based and behavioralbased methods. The proposed system uses a decentralized blockchain network to share and store malware signatures and ...
Sheela S.   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy