Results 11 to 20 of about 435,902 (281)

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

On Secure Workflow Decentralisation on the Internet [PDF]

open access: yes, 2010
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir   +28 more
core   +3 more sources

Inflammatory monocyte gene signature predicts beneficial within group effect of simvastatin in patients with schizophrenia spectrum disorders in a secondary analysis of a randomized controlled trial

open access: yesBrain, Behavior, & Immunity - Health, 2022
Immune dysregulation has been reported in schizophrenia spectrum disorders (SSD). In the past decade, several trials using anti-inflammatory agents for treatment of SSD have been completed, with so far limited success.
Mareike Aichholzer   +8 more
doaj   +1 more source

A Peered Bulletin Board for Robust Use in Verifiable Voting Systems [PDF]

open access: yes, 2014
The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the
Culnane, Chris, Schneider, Steve
core   +2 more sources

An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2013
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj   +3 more sources

A delta-radiomics model for preoperative prediction of invasive lung adenocarcinomas manifesting as radiological part-solid nodules

open access: yesFrontiers in Oncology, 2022
PurposeThis study aims to explore the value of the delta-radiomics (DelRADx) model in predicting the invasiveness of lung adenocarcinoma manifesting as radiological part-solid nodules (PSNs).MethodsA total of 299 PSNs histopathologically confirmed as ...
Wufei Chen   +8 more
doaj   +1 more source

An Elliptic Curve Threshold Group Signature Scheme [PDF]

open access: yesInternational Conference on Aerospace Sciences and Aviation Technology, 2013
In a (t,n) threshold group signature scheme, only t or more signers of the group can sign messages on behalf of the group. Elliptic Curve Cryptography (ECC) was introduced by Victor Miller and Neal Koblitz in 1985. ECC proposed as an alternative to established public-key systems such as DSA and RSA.
A. Kamal, H. Dahshan, A. Rohiem
openaire   +1 more source

Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]

open access: yesJisuanji kexue
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj   +1 more source

Prognostic Risk Signature and Comprehensive Analyses of Endoplasmic Reticulum Stress-Related Genes in Lung Adenocarcinoma

open access: yesJournal of Immunology Research, 2022
Lung adenocarcinoma (LUAD) is the main pathological subtype of non-small-cell lung cancer. Endoplasmic reticulum stress (ERS) has been found to be involved in multiple tumor-related biological processes.
CaiZhen Yang   +6 more
doaj   +1 more source

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

Home - About - Disclaimer - Privacy