نتایج جستجو برای: proxy modeling

تعداد نتایج: 414282  

2008
SHENG-YUAN YANG CHUN-LIANG HSU DONG-LIANG LEE LAWRENCE Y. DENG

This paper expresses the results of our research in developing a multi-agent system: FAQ-master as an intelligent Web information integration system based upon intelligent retrieval, filtering, integration, and ranking capabilities in order to provide highquality FAQ answers from the Web to meet the user information request. We are describing FAQ-master, discussing how it improves FAQ query qua...

Journal: :I. J. Network Security 2008
Zuo-Wen Tan

In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In a nominative proxy signature scheme, only the nominee can verify the signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we first classify the nominative proxy signat...

Journal: :IACR Cryptology ePrint Archive 2004
Zuo-Wen Tan Zhuo-Jun Liu

In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy, who generates a nominative signature on behalf of the original signer. In a nominative proxy signature scheme, only the nominee can verify the signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we first classify the nominative proxy signature int...

Journal: :IACR Cryptology ePrint Archive 2008
Bin Wang

A new identity based proxy signature scheme Bin Wang Information Engineering College of Yangzhou University Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo et al. first introduced the notion of proxy signature and a lot of researc...

Journal: :IACR Cryptology ePrint Archive 2003
Hung-Min Sun Bin-Tsan Hsieh

Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different app...

2010
Cheng-Chi Lee Tzu-Chun Lin Shiang-Feng Tzeng Min-Shiang Hwang

A rich set of proxy signature schemes have been widely researched and discussed so far. However, they have been mainly focusing on dealing with one or two separate proxy situations each. In this article, the authors proposed the generalization of the (t1/n1 − t2/n2) proxy signature scheme based on the factorization of the square root modulo of a composite number. This scheme can be applied to e...

2014
Karim Chalak

The method of indirect least squares (ILS) using a proxy for a discrete instrument is shown to identify a weighted average of local treatment e¤ects. The weights are nonnegative if and only if the proxy is intensity preserving for the instrument. A similar result holds for instrumental variables (IV) methods such as two stage least squares. Thus, one should carefully interpret estimates for cau...

Journal: :Computer Standards & Interfaces 2009
Zuowen Tan Zhuojun Liu

In a (t, n) threshold proxy signature scheme, an original signer can delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer, but t − 1 or fewer proxy signers cannot generate a valid proxy signature. In this paper, we review the security of C. L. Hsu et al.’s threshold proxy signature...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید