نتایج جستجو برای: proxy modeling
تعداد نتایج: 414282 فیلتر نتایج به سال:
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a common problem. That is, a verifier cannot ascertain that a proxy signature was signed by the proxy signer during the valid delegation peri...
Proxy ‘Actualism’ Karen Bennett Forthcoming in Philosophical Studies
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...
We present a general-purpose method to train Markov chain Monte Carlo kernels, parameterized by deep neural networks, that converge and mix quickly to their target distribution. Our method generalizes Hamiltonian Monte Carlo and is trained to maximize expected squared jumped distance, a proxy for mixing speed. We demonstrate large empirical gains on a collection of simple but challenging distri...
RADIUS specified by RFC2865 and RFC2866 is used widely for remote dial-in user authentication and authorization. Packet filter such as Linux Netfilter is a primary toolkit to develop firewall or intrusion detection system. Modeling RADIUS client and packet filter together, a security gateway for grid computing is developed as an embedded or a proxy system. To reinforce the flexibility of the ga...
An important characteristic of a Web page|the number of objects embedded in it|is di cult to obtain using publicly available sources of Web characterization data, such as proxy and server traces. It is important, however, to have an estimate for the number of embedded objects found in Web pages for modeling of realistic Web sites and workloads. We analyzed two data sets collected using active m...
MSCI Barra Product Insights © 2007 MSCI Barra. All rights reserved. 1 of 10 Please refer to the disclaimer at the end of this document. This case study provides an introduction to modeling assets and liabilities for asset owners within BarraOne. We show how to use BarraOne to analyze both assets and liabilities in a shared framework for understanding risk and return. Our example uses zero coupo...
— Evidence is reviewed for climate change and its causes over the interval spanning roughly the past millennium. Particular emphasis is placed on patterns of climate change influencing Mediterranean climates of the Northern Hemisphere. The evidence is taken from studies using high-resolution climate “proxy” data sources, and climate modeling simulations. The available evidence suggests that for...
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید