نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy ReEncryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real ...
P ROXIES have become a crucial part of the Internet infrastructure during the past few years. In the traditional client/server model, two applications communicate directly with a clear separation of roles between the client and the server. A proxy extends this model by acting as an intermediary between a client and server. Although the notion of proxies predates the Web, the rapid growth of the...
Variability on centennial to multi-centennial timescales is mentioned as a feature in reconstructions of the Holocene climate. As more long transient model simulations with complex climate models become available and efforts have been made compile large proxy databases, there now unique opportunity study variability greater detail amount data than earlier. This paper presents spectral analysis ...
We introduce the Fastron, a configuration space (C-space) model to be used as a proxy to kinematic-based collision detection. The Fastron allows iterative updates to account for a changing environment through a combination of a novel formulation of the kernel perceptron learning algorithm and an active learning strategy. Our simulations on a 7 degree-of-freedom arm indicate that proxy collision...
At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem ...
Child Labor Variation by Type of Respondent: Evidence from a Large-Scale Study This study uses a nationally representative survey to analyze a key survey design decision in child labor measurement: self-reporting versus proxy interviewing. The child/proxy disagreement affects 20 percent of the sample, which translates into a 17.1 percentage point difference in the national rate of child labor b...
RSA is a key cryptography technique and provides various interfaces for the applied software in real-life scenarios. Although some good results were achieved in speeding up the computation of pairing function in recent years, the computation cost of the pairings is much higher than that of the exponentiation in a RSA group. So it is still interesting to design efficient cryptosystems based on R...
The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead since signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: Singh and Verma’s scheme and Yoon et al.’s scheme. Unfortunately, Tian et al. by presenting two forgery a...
EEective management of battleeeld networks requires a hierarchical network management architecture wherein managers can dyanmically delegate management tasks to intermediate managers. In this report we describe a novel paradigm called the spreadsheet paradigm which extends the traditional at SNMP management model to a hierarchical architecture. We present a spreadsheet MIB, language, and event ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید