نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

Journal: :IACR Cryptology ePrint Archive 2016
Sanjit Chatterjee Neal Koblitz Alfred Menezes Palash Sarkar

How to deal with large tightness gaps in security proofs is a vexing issue in cryptography. Even when analyzing protocols that are of practical importance, leading researchers often fail to treat this question with the seriousness that it deserves. We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.

Journal: :IACR Cryptology ePrint Archive 2012
Alex Escala Javier Herranz Benoît Libert Carla Ràfols

Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications in theoretical cryptography. The notion has been recently extended to the identity-based scenario by Bellare et al. (Eurocrypt’12). We provide one more step in this direction, by considering the notion of hierarchical identity-base...

Journal: :IMA journal of mathematics applied in medicine and biology 1988
E A Thompson

Although there have been several mathematical formulations of multilocus segregation, multilocus gene identity by descent in pedigrees has been little considered. Here we present a computationally feasible algorithm for the computation of two-locus kinship for individuals between whom there may be multiple complex relationships, and use it to investigate patterns of two-locus gene identity by d...

2017
Mark Stevens Tim Rees Pete Coffee Niklas K Steffens S Alexander Haslam Remco Polman

Against the backdrop of a global physical inactivity crisis, attempts to both understand and positively influence physical activity behaviours are characterized by a focus on individual-level factors (e.g. cognitions, attitudes, motivation). We outline a new perspective, drawn from an emerging body of work exploring the applicability of social identity and self-categorization theories to domain...

2011
Bob Gilbert Richard A. Kemmerer Christopher Krügel Giovanni Vigna

Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captu...

2011
Cheryl R. Kaiser Nao Hagiwara

This investigation examined whether gender identification moderates women’s working memory following exposure to situations that threaten the integrity of their gender group. Young adults read sentences that either threatened women’s gender identity (in the social identity threat condition) or did not threaten this identity (in the control condition). During this sentence-reading task, particip...

Journal: :IACR Cryptology ePrint Archive 2008
Piyi Yang Zhenfu Cao Xiaolei Dong

We introduce a new cryptographic primitive which is the signature analogue of fuzzy identity based encryption(IBE). We call it fuzzy identity based signature(IBS). It possesses similar error-tolerance property as fuzzy IBE that allows a user with the private key for identity ω to decrypt a ciphertext encrypted for identity ω′ if and only if ω and ω′ are within a certain distance judged by some ...

2012
Alexandre B. Augusto Manuel Eduardo Correia

Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with the...

Journal: :European Transactions on Telecommunications 2011
Min-Shiang Hwang Song-Kong Chong Hsia-Hung Ou

In this paper, we propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, “home network should be partially trusted in an authentication scheme” to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ”subscriber identity/location confidential” ...

Journal: :IEEE Access 2022

This study focuses on the influence of organizational identity knowledge employees’ job performance and mediating effect work values. Job is divided into task contextual then a theoretical hypothesis model identity-work values-job constructed based theory social identity. Combined with questionnaire data 483 employees, SEM was used to empirically test whether valid. It found that has pos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید