نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Usin...
A proxy re-encryption scheme (PRE) allows a semi-trusted proxy to convert a ciphertext encrypted under one key into a ciphertext encrypted under another key without leaking the underlying plaintext. In the process of the arithmetic processing, proxy should be able to learn as little information about the plaintext as possible. Conditional proxy re-encryption (CPRE) is a new cryptography primiti...
Existing approaches to data integration generally propose building a layer on top of database systems to perform the necessary data transformations and manage data consistency. We show how support for the integration of heterogeneous data sources can instead be built into a database system through the introduction of a generic proxy concept. Over the last two decades a great deal of research in...
Sedimentary proxy records constitute a significant portion of the recorded evidence that allows us to investigate paleoclimatic conditions and variability. However, uncertainties in the dating of proxy archives limit our ability to fix the timing of past events and interpret proxy record intercomparisons. While there are various age-modeling approaches to improve the estimation of the age–depth...
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public...
Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multiparty proxy authorization scheme, a group of n members can cooperate to entrust their right...
A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. f...
A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present two efficient types of proxy signature scheme. The first one is the proxy signature for warrant partial delegation combines an advantage of two well known warrant partial delegation schemes. This proposed ...
In mobile computing, the proxy-based software may access the proxy far from the visited network rather than the nearby proxy. Accordingly, the proxy-based software’s communication hardly gets advantages from the proxy and may suffer disturbances. We propose the Tapster as the transparent proxy redirector for mobile computing. The Tapster can automatically redirect applications’ requests to a ne...
Certain types of database-backed web sites heavily utilize userdefined functions in SQL queries. Unfortunately, existing web proxy caching schemes can not handle these functions. In order to enable proxy caching for such web sites, we propose a template-based proxy caching framework, a function proxy, for table-valued functions. In our framework, function templates are registered with the proxy...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید