Results 31 to 40 of about 5,707 (192)
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
With the emergence of mobile communication technologies, we are entering the fifth generation (5G) mobile communication system era. Various application scenarios will arise in the 5G era to meet the different service requirements.
Jingwei Liu +4 more
doaj +1 more source
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model [PDF]
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random ...
Buus Nielsen, Jesper +2 more
core +2 more sources
Anonymous Single-Sign-On for n designated services with traceability [PDF]
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan +26 more
core +2 more sources
A Unified Framework For Quantum Unforgeability
50 pages, 5 ...
Doosti, Mina +3 more
openaire +2 more sources
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core +1 more source
Unforgiveness, rumination, and depressive symptoms among older adults [PDF]
The experience of feeling unforgiven for past transgressions may contribute to depressive symptoms in later life. This article tests a model in which feeling unforgiven by God and by other people have direct effects on depressive symptoms while self-unforgiveness and rumination mediate this relationship.
Berit, Ingersoll-Dayton +2 more
openaire +2 more sources
PUDA - Privacy and Unforgeability for Data Aggregation [PDF]
Existing work on secure data collection and secure aggregation is mainly focused on confidentiality issues. That is, ensuring that the untrusted Aggregator learns only the aggregation result without divulging individual data inputs. In this paper however we consider a malicious Aggregator which is not only interested in compromising users’ privacy but ...
Iraklis Leontiadis +3 more
openaire +4 more sources
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core +1 more source
Solvent‐driven reversible “crystal to crystal” transformation of copper(I)‐iodine clusters with significant difference of luminescent color and quantum yields is reported. The differences before and after this transformation may be related to more efficient thermally activated delayed fluorescence (TADF) achieved by cluster 1 through space charge ...
Zhao‐Xing Gao +5 more
wiley +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source

