Results 11 to 20 of about 435,902 (281)
Signcryption schemes with threshold unsigncryption, and applications [PDF]
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier +2 more
core +2 more sources
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
Immune dysregulation has been reported in schizophrenia spectrum disorders (SSD). In the past decade, several trials using anti-inflammatory agents for treatment of SSD have been completed, with so far limited success.
Mareike Aichholzer +8 more
doaj +1 more source
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems [PDF]
The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the
Culnane, Chris, Schneider, Steve
core +2 more sources
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj +3 more sources
PurposeThis study aims to explore the value of the delta-radiomics (DelRADx) model in predicting the invasiveness of lung adenocarcinoma manifesting as radiological part-solid nodules (PSNs).MethodsA total of 299 PSNs histopathologically confirmed as ...
Wufei Chen +8 more
doaj +1 more source
An Elliptic Curve Threshold Group Signature Scheme [PDF]
In a (t,n) threshold group signature scheme, only t or more signers of the group can sign messages on behalf of the group. Elliptic Curve Cryptography (ECC) was introduced by Victor Miller and Neal Koblitz in 1985. ECC proposed as an alternative to established public-key systems such as DSA and RSA.
A. Kamal, H. Dahshan, A. Rohiem
openaire +1 more source
Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj +1 more source
Lung adenocarcinoma (LUAD) is the main pathological subtype of non-small-cell lung cancer. Endoplasmic reticulum stress (ERS) has been found to be involved in multiple tumor-related biological processes.
CaiZhen Yang +6 more
doaj +1 more source
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources

