نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
intelligent wells provide the ability for monitoring and control of downhole environment of the wells. downhole monitoring is achieved through sensors while control is realized with downhole valves. recovery from intelligent wells can be improved by proper selection of candidate wells/fields and optimizing the number, location and performance of the installed interval control valves. design cri...
Recently, it has been widely known that deep neural networks are highly vulnerable and easily broken by adversarial attacks. To mitigate the vulnerability, many defense algorithms have proposed. to improve robustness, works try enhance feature representation imposing more direct supervision on discriminative feature. However, existing approaches lack an understanding of learning adversarially r...
Arabia considers Iran the main source of instability in the region and believes that Iran seeks to dominate the Sunni Arabs through creating Shiite crescent. Especially after the Islamic Revolution, two countries have been as the rivals in the Persian Gulf. Ideological competition is considered as the core of competition in the areas of geopolitics, geostrategics and geoeconomics. In recent yea...
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...
ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...
The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید