Results 61 to 70 of about 523,881 (183)
90-gene signature assay for tissue origin diagnosis of brain metastases
Background Brain metastases (BM) are the most common intracranial tumors. 2–14% of BM patients present with unknown primary site despite intensive evaluations.
Yulong Zheng +11 more
doaj +1 more source
This paper proposes an integrated authentication framework to enhance trust, key security, and auditability in Self-Sovereign Identity (SSI) environments.
Jihwan Kim, Younho Lee, Daeseon Choi
doaj +1 more source
Risk Model for Choosing Signature Thresholds for Software Updates
The timely installation of software updates has become an accepted best practice for protecting connected systems from persistent threats. Modern software update frameworks and trust anchor management protocols allow for the use of multiple digital ...
Brian Romansky +2 more
doaj +1 more source
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold ...
Ming XU, Xuru LI, Chaobin LIU, Yao MA
doaj +2 more sources
Positron line radiation from halo WIMP annihilations as a dark matter signature [PDF]
We suggest a new signature for dark matter annihilation in the halo: high energy positron line radiation. Because the cosmic ray positron spectrum falls rapidly with energy, e+'s from halo WIMP annihilations can be a significant, clean signal for very ...
Turner, Michael S., Wilczek, Frank
core +1 more source
A Rational Threshold Signature Model and Protocol Based on Different Permissions
This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together.
Bojun Wang, Cheng Cai, Quan Zhou
doaj +1 more source
Deletable blockchain based on threshold ring signature
With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a ...
Yanli REN +3 more
doaj +2 more sources
A lightweight threshold signature scheme for internet of things devices
In resource-constrained Internet of Things (IoT) environments, threshold-based digital signatures have become a key technology due to their decentralized security advantages.
Kaili Dou +3 more
doaj +1 more source
[[alternative]]The Desing of Threshold Proxy Threshold Signature Schemes [PDF]
計畫編號:NSC91-2213-E032-014研究期間:200208~200307研究經費:384,000[[sponsorship ...
黃心嘉
core
Turning Hash-Based Signatures into Distributed Signatures and Threshold Signatures
We introduce techniques to transform existing stateful hash based signature (HBS) schemes, such as LMS or XMSS, into efficient threshold and distributed signature schemes. Our approach requires a trusted dealer for setup, and uses a large (up to a few GiB, typically) common reference value for each new public key. The dealer generates the keypair and
John Kelsey, Nathalie Lang, Stefan Lucks
openaire +1 more source

