نتایج جستجو برای: proxy modeling

تعداد نتایج: 414282  

2003
Wenzheng Gu

Internet access by nomadic users roaming on a mobile network presents a scenario of access that is substantially different from the wired network. With current Web caching technology, accessing the Web while mobile is slow not only because of bandwidth limitations, but also due to moving away from the home Web caching proxy. Furthermore, current Web caching strategies ignore Web access patterns...

Journal: :Journal of the Royal Society of Medicine 1998

Journal: :I. J. Network Security 2007
Tianjie Cao Xianping Mao

A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy signature schemes are vulnerable to an original signer’s forgery attack. In this attack, a malicious original signer can impersonate a proxy signer and produce a forged proxy signature on a message. A third party will in...

Journal: :IACR Cryptology ePrint Archive 2010
Kitae Kim Daehun Nyang

The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, pro...

2000
Byoungcheon Lee Heesun Kim Kwangjo Kim

Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. In this paper we show various attack scenarios against previous proxy signature schemes, which shows that proxy signature schemes should be designed very carefully. Based on these weaknesses, we prov...

Journal: :Computers & Security 2003
Li-Hua Li Shiang-Feng Tzeng Min-Shiang Hwang

In the past few years, many excellent studies on proxy signature schemes have been published. Yet, traditional proxy signature schemes are mainly aimed at dealing with one or two separate proxy conditions each. In this article, the authors shall present a generalized version of the (t1/n1 – t2/n2) proxy signature scheme based on the discrete logarithms that can be applied to every proxy situati...

2000
Daniela Rosu Arun Iyengar Daniel Dias

Numerous studies show that proxy cache miss ratios are typically at least 40%-50%. This paper proposes and evaluates a new approach for improving the throughput of proxy caches by reducing cache miss overheads. An embedded system able to achieve sig-niicantly better communications performance than a traditional proxy lters the requests directed to a proxy cache, forwarding the hits to the proxy...

2006
Jiqiang Lu

Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید