نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
Most of caching proxy servers are installed between the Internet and enterprise networks (aka the Intranet). The performance of the caching proxy server is very important for WWW service because the server handles all of the WWW transactions in the organization. In this paper, as a performance measure of the caching proxy server, we exploit the WWW object retrieval time of clients through the c...
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kuros...
Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose a new type of digital proxy signature scheme in which the warrant message can be recovered from the proxy signature. In this scheme the warrant message is conveyed within the pr...
In 1998, Blaze, Bleumer, and Strauss proposed new kind of cryptographic primitives called proxy re-encryption and proxy resignature[BBS98]. In proxy re-encryption, a proxy can transform a ciphertext computated under Alice’s public key into one that can be opened under Bob’s decryption key. In proxy re-signature, a proxy can transform a signature computated under Alice’s secret key into one that...
While on-demand routing protocols have been optimized to use the aid of proxy nodes by considering the possibility of long-lived partitions due to intermittent connectivity, they do not consider the chances of using a proxy for a long distance between a pair of source and destination. In this paper, we introduce a Proxy-Assisted Routing (PART) for efficient data transmission by selecting a prox...
This paper presents a novel proxy convertible multi-authenticated encryption (multi-AE) scheme and its variant with message linkages. The proposed scheme allows two or more original signers to cooperatively delegate their signing power to an authorized proxy signer, such that the proxy signer can generate a valid authenticated ciphertext on behalf of the original signing group and only a design...
All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy si...
Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original s...
The bandwidth-intensive and long-lived nature of high quality digital video makes it a challenging problem to transmit such video over the Internet. In this paper, we propose a scalable and flexible framework integrating proxy-based prefix caching with periodic broadcast of the suffix of a video from the server, for efficiently streaming a set of popular videos to a large number of asynchronous...
Overview Implementing an application-level server-side proxy 1 [GHJV95][POSA96] can result in a large number of positive consequences. However, the aspects of network security, single sign on and integration imply different forces upon such a reverse proxy. Attaching the surrounding infrastructure can show additional roadblocks for a successful deployment. The following patterns try to structur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید