Results 11 to 20 of about 1,597,742 (299)
On modular decompositions of system signatures [PDF]
Considering a semicoherent system made up of $n$ components having i.i.d. continuous lifetimes, Samaniego defined its structural signature as the $n$-tuple whose $k$-th coordinate is the probability that the $k$-th component failure causes the system to ...
Barlow +16 more
core +7 more sources
Systemic Metabolic Signatures of Oral Diseases
Systemic metabolic signatures of oral diseases have been rarely investigated, and prospective studies do not exist. We analyzed whether signs of current or past infectious/inflammatory oral diseases are associated with circulating metabolites. Two study populations were included: the population-based Health-2000 ( n = 6,229) and Parogene ( n = 452), a
A. Salminen +10 more
openaire +3 more sources
Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress in healthcare detection. It is extremely important to reduce the cost of communication and ensure the authenticity and integrity of data. A
Yanyan Gu +3 more
doaj +1 more source
Research and Application of Cloud Digital Signature Technology [PDF]
Transmission signed file transfer of digital signature technology based on Public Key Infrastructure(PKI) is usually subject to factors such as the environment,the terminal,and the file format between the users,and the signatures between different ...
JIAN Chunfu,XIE Jihua,JIN Junhua
doaj +1 more source
Infrared signature suppression effect of diesel engine wet exhaust system
ObjectivesAs the ship side wet exhaust system is widely equipped on many stealth frigates, it is necessary to study its infrared signature suppression (IRSS) effect.MethodsIn this paper, the IRSS principle of the wet exhaust system is analyzed, a ...
Xiaoliang PU, Tao ZHONG, Yanzhen WANG
doaj +1 more source
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source
Hidden Signature for DTW Signature Verification in Authorizing Payment Transactions
Traditional use of dynamic time warping for signature verification consists of forming some dissimilarity measure between the signature in question and a set of “template signatures”.
Joanna Putz-Leszczyńska +1 more
doaj +1 more source
Background: With the massive e-commerce transactions and document transfers, reliable system protection is needed. A digital signature is a tool that consists of encryption and decryption algorithms in a secret key to prevent data theft and online fraud.
Ahmad Arif Santosa, Firdaus Alamsjah
doaj +1 more source
Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature [PDF]
To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity ...
RAO Jintao, CUI Zhe
doaj +1 more source
Decentralized Malware Attacks Detection using Blockchain [PDF]
This research introduces an approach to detect malware attacks using blockchain technology that integrates signature-based and behavioralbased methods. The proposed system uses a decentralized blockchain network to share and store malware signatures and ...
Sheela S. +4 more
doaj +1 more source

