نتایج جستجو برای: proxy

تعداد نتایج: 25930  

Journal: :Hadtudomány 2021

A proxy háborúk vizsgálata során a legtöbb kutató megállapította, hogy azok jelentős múlttal rendelkeznek. Napjainkban elengedhetetlen felülvizsgálni hadtudományban alkalmazott egyes alapfogalmakat, mert hibrid hadviselésnek hatása lehet rájuk. Ezek lehetséges hatások meghatározások szélesedéséhez vezethetnek, kutatások is szélesebb területet érintenek napjainkban. civil gazdasági vállalatoknak...

2011
Rajeev Anand Sahu Sahadeo Padhye

Proxy signature is useful in situation when a user wants to authorize an agent called proxy signer to sign any document on his behalf. Multi-proxy multi-signature is one of the primitives of proxy signature. Bilinear pairing makes the system efficient and provides an ease in computation. In this paper, we propose an ID-based multi-proxy multi-signature scheme from bilinear pairings based on Com...

2011
Robin G. de Vilder Marcel P. Visser

High frequency data are often used to construct proxies for the daily volatility in discrete time volatility models. This paper introduces a calculus for such proxies, making it possible to compare and optimize them. The two distinguishing features of the approach are (1) a simple continuous time extension of discrete time volatility models and (2) an abstract definition of volatility proxy. Th...

Journal: :Softwaretechnik-Trends 2002
Beate Commentz-Walter

Ziel dieses Artikels ist eine Verbesserung des Entwicklungsprozesses von Kommunikationsprotokollen verteilter Systeme mit Entwurfsmustern. Dazu wird hier das“General Distributed Proxy” Pattern beschrieben. Es ist ein Entwurfsmuster für die Kommunikation verteilter Objekte das das “Distributed Proxy” Pattern [SRG 02], [SRGA 02] im Sinne der Offenhaltung des Kommunikationsprotokolls verallgemeine...

2011
B.Umaprasada Rao

In a multi-proxy signature scheme, an original signer delegates his signing power to a group of proxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signature on behalf of the original signer; and any one can verify the validity of the multi-proxy signature. But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concep...

Journal: :Stroke 2012
Alan M Jette Pengsheng Ni Elizabeth K Rasch Jed Appelman M Elizabeth Sandel Joseph Terdiman Leighton Chan

BACKGROUND AND PURPOSE Our objective was to examine the agreement between adult patients with stroke and family member or clinician proxies in activity measure for postacute care (AM-PAC) summary scores for daily activity, basic mobility, and applied cognitive function. METHODS This study involved 67 patients with stroke admitted to a hospital within the Kaiser Permanente of Northern Californ...

Journal: :CoRR 2005
Amit K. Awasthi Sunder Lal

In some cases, the original signer may delegate its signing power to a specified proxy group while ensuring individual accountability of each participant signer. The proxy signature scheme that achieves such purpose is called the multi-proxy signature scheme and the signature generated by the specified proxy group is called multi-proxy signature for the original signer. Recently such scheme has...

Journal: :CoRR 2005
Jun-Bao Liu Guozhen Xiao

which efficiently combines a multi-proxy multi-signature scheme with a signcryption, is proposed. Its security is analyzed in detail. In our scheme, a proxy signcrypter group could be authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryptions can be generated by the cooperation of all the signcrypters in the authorized proxy sig...

Journal: :CoRR 2013
Tejaswi Agarwal Mike A. Leonetti

Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers. Technically, an interception mode is not designed for client authentication, but implementation in certain organizations does require this feature. In this paper, we focus ...

2009
M. Mehta

Proxy signatures allow a signer to delegate signing ability to a proxy signer. Many schemes have been proposed for proxy signatures under typical security requirements. The authors propose a proxy signature model with extended security requirements. Based on Shamir’s online/ offline signature scheme, a proxy signature scheme is proposed for the model. In addition to the typical requirements, th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید