نتایج جستجو برای: proxy modeling
تعداد نتایج: 414282 فیلتر نتایج به سال:
This paper expresses the results of our research in developing a multi-agent system: FAQ-master as an intelligent Web information integration system based upon intelligent retrieval, filtering, integration, and ranking capabilities in order to provide highquality FAQ answers from the Web to meet the user information request. We are describing FAQ-master, discussing how it improves FAQ query qua...
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In a nominative proxy signature scheme, only the nominee can verify the signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we first classify the nominative proxy signat...
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy, who generates a nominative signature on behalf of the original signer. In a nominative proxy signature scheme, only the nominee can verify the signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we first classify the nominative proxy signature int...
A new identity based proxy signature scheme Bin Wang Information Engineering College of Yangzhou University Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo et al. first introduced the notion of proxy signature and a lot of researc...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different app...
A rich set of proxy signature schemes have been widely researched and discussed so far. However, they have been mainly focusing on dealing with one or two separate proxy situations each. In this article, the authors proposed the generalization of the (t1/n1 − t2/n2) proxy signature scheme based on the factorization of the square root modulo of a composite number. This scheme can be applied to e...
The method of indirect least squares (ILS) using a proxy for a discrete instrument is shown to identify a weighted average of local treatment e¤ects. The weights are nonnegative if and only if the proxy is intensity preserving for the instrument. A similar result holds for instrumental variables (IV) methods such as two stage least squares. Thus, one should carefully interpret estimates for cau...
In a (t, n) threshold proxy signature scheme, an original signer can delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer, but t − 1 or fewer proxy signers cannot generate a valid proxy signature. In this paper, we review the security of C. L. Hsu et al.’s threshold proxy signature...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید