نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
In 2009, Chang and Cheng proposed an efficient proxy raffle protocol. In their scheme, the raffle tickets are known by participants as well as raffle organizers. Hence, unless we implicitly add the unrealistic assumption that the organizer is trustworthy, this may cause problems and threaten the security of the e-raffle from the viewpoint of participants. In this paper, we use the concept of pr...
Recent years have witnessed the rapid development of online auctions. Currently, some online auctions, such as eBay, introduce a proxy bidding policy, under which bidders submit their maximum bids and delegate to a proxy agent to automatically outbid other competitors for the top bidder, whereas other online auctions do not. This paper compares these two widely used auction mechanisms (proxy se...
BACKGROUND Proxy respondents, partners of multiple sclerosis (MS) patients, can provide valuable information on the MS patients' disease. In an earlier publication we found relatively good agreement on patient reported outcomes (PROs) measuring physical impact and functioning, but we found large differences on (neuro)psychological scales. OBJECTIVE We aim to identify patient and proxy related...
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this delegated set on behalf of the originator. Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [27] and warrant-hiding proxy signatures [28], have been introduced. In thi...
A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t−1 or less of them cannot do the same thing. Threshold proxy signatures have been suggested for use in the scenarios of distributed computing where delegation of rights is qui...
Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...
This paper proposes a protocol proxy scheme that can emulate the open shortest path first (OSPF) protocol in an effective and flexible manner. It is implemented in our developed network emulator, which is used to test network controllers for IP optical network management. In the protocol scheme, OSPF protocol emulation is achieved by combining an OSPF protocol proxy (introduced here) and an OSP...
In this paper, we study streaming multiple videos from a remote server to asynchronous clients through a group of proxies, using multicast on both the wide area server-proxy paths and the local area proxy-client paths. In this setting, we present an algorithm to determine the optimal cache allocation among videos at each proxy and develop an efficient streaming video distribution scheme. Our ev...
We propose a web forward proxy server with authentication method using Shibboleth. With this proxy Single Sign-On would benefit a user and also authentication using Shibboleth protocol solves problems in basic access authentication and digest access authentication supported by existing web forward proxy servers. In order to realize it, the proxy needs to recognize attributes of shibboleth proto...
This paper presents public verifiable identity based multi-proxy multisigncryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید