نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :Concurrency and Computation: Practice and Experience 2015
Kaitai Liang Liming Fang Duncan S. Wong Willy Susilo

Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy ReEncryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real ...

Journal: :IEEE Journal on Selected Areas in Communications 2002
Ernst W. Biersack

P ROXIES have become a crucial part of the Internet infrastructure during the past few years. In the traditional client/server model, two applications communicate directly with a clear separation of roles between the client and the server. A proxy extends this model by acting as an intermediary between a client and server. Although the notion of proxies predates the Web, the rapid growth of the...

Journal: :Quaternary Science Reviews 2022

Variability on centennial to multi-centennial timescales is mentioned as a feature in reconstructions of the Holocene climate. As more long transient model simulations with complex climate models become available and efforts have been made compile large proxy databases, there now unique opportunity study variability greater detail amount data than earlier. This paper presents spectral analysis ...

2017
Nikhil Das Naman Gupta Michael Yip

We introduce the Fastron, a configuration space (C-space) model to be used as a proxy to kinematic-based collision detection. The Fastron allows iterative updates to account for a changing environment through a combination of a novel formulation of the kernel perceptron learning algorithm and an active learning strategy. Our simulations on a 7 degree-of-freedom arm indicate that proxy collision...

Journal: :J. Internet Serv. Inf. Secur. 2013
Kunwar Singh C. Pandu Rangan A. K. Banerjee

At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem ...

2013
Ana C. Dammert Jose Galdo

Child Labor Variation by Type of Respondent: Evidence from a Large-Scale Study This study uses a nationally representative survey to analyze a key survey design decision in child labor measurement: self-reporting versus proxy interviewing. The child/proxy disagreement affects 20 percent of the sample, which translates into a 17.1 percentage point difference in the national rate of child labor b...

Journal: :I. J. Network Security 2017
Lunzhi Deng Huawei Huang Yunyun Qu

RSA is a key cryptography technique and provides various interfaces for the applied software in real-life scenarios. Although some good results were achieved in speeding up the computation of pairing function in recent years, the computation cost of the pairings is much higher than that of the exponentiation in a RSA group. So it is still interesting to design efficient cryptosystems based on R...

Journal: :Int. J. Communication Systems 2016
Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh Willy Susilo

The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead since signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: Singh and Verma’s scheme and Yoon et al.’s scheme. Unfortunately, Tian et al. by presenting two forgery a...

1997
Adarshpal S. Sethi Pramod Kalyanasundaram Christopher M. Sherwin Dong Zhu

EEective management of battleeeld networks requires a hierarchical network management architecture wherein managers can dyanmically delegate management tasks to intermediate managers. In this report we describe a novel paradigm called the spreadsheet paradigm which extends the traditional at SNMP management model to a hierarchical architecture. We present a spreadsheet MIB, language, and event ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید