Results 61 to 70 of about 523,881 (183)

90-gene signature assay for tissue origin diagnosis of brain metastases

open access: yesJournal of Translational Medicine, 2019
Background Brain metastases (BM) are the most common intracranial tumors. 2–14% of BM patients present with unknown primary site despite intensive evaluations.
Yulong Zheng   +11 more
doaj   +1 more source

Key-Audit Chain (KAC): A Resilient and Reliable Key Management Framework for DID-Based Decentralized Environments

open access: yesIEEE Access
This paper proposes an integrated authentication framework to enhance trust, key security, and auditability in Self-Sovereign Identity (SSI) environments.
Jihwan Kim, Younho Lee, Daeseon Choi
doaj   +1 more source

Risk Model for Choosing Signature Thresholds for Software Updates

open access: yesIEEE Open Journal of the Computer Society
The timely installation of software updates has become an accepted best practice for protecting connected systems from persistent threats. Modern software update frameworks and trust anchor management protocols allow for the use of multiple digital ...
Brian Romansky   +2 more
doaj   +1 more source

Dual-proxy key-based threshold signature scheme for ship ad-hoc network

open access: yesTongxin xuebao, 2018
In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold ...
Ming XU, Xuru LI, Chaobin LIU, Yao MA
doaj   +2 more sources

Positron line radiation from halo WIMP annihilations as a dark matter signature [PDF]

open access: yes
We suggest a new signature for dark matter annihilation in the halo: high energy positron line radiation. Because the cosmic ray positron spectrum falls rapidly with energy, e+'s from halo WIMP annihilations can be a significant, clean signal for very ...
Turner, Michael S., Wilczek, Frank
core   +1 more source

A Rational Threshold Signature Model and Protocol Based on Different Permissions

open access: yesJournal of Applied Mathematics, 2014
This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together.
Bojun Wang, Cheng Cai, Quan Zhou
doaj   +1 more source

Deletable blockchain based on threshold ring signature

open access: yesTongxin xuebao, 2019
With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a ...
Yanli REN   +3 more
doaj   +2 more sources

A lightweight threshold signature scheme for internet of things devices

open access: yesJournal of King Saud University: Computer and Information Sciences
In resource-constrained Internet of Things (IoT) environments, threshold-based digital signatures have become a key technology due to their decentralized security advantages.
Kaili Dou   +3 more
doaj   +1 more source

[[alternative]]The Desing of Threshold Proxy Threshold Signature Schemes [PDF]

open access: yes
計畫編號:NSC91-2213-E032-014研究期間:200208~200307研究經費:384,000[[sponsorship ...
黃心嘉
core  

Turning Hash-Based Signatures into Distributed Signatures and Threshold Signatures

open access: yesIACR Communications in Cryptology
We introduce techniques to transform existing stateful hash based signature (HBS) schemes, such as LMS or XMSS, into efficient threshold and distributed signature schemes. Our approach requires a trusted dealer for setup, and uses a large (up to a few GiB, typically) common reference value for each new public key. The dealer generates the keypair and
John Kelsey, Nathalie Lang, Stefan Lucks
openaire   +1 more source

Home - About - Disclaimer - Privacy