نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :Security and Communication Networks 2015
Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh Willy Susilo

Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public...

In recent years, a gap between banks’ deposits and loans has been emerging and rather continuously growing. Also, loans to liabilities ratio and liquidity multiplier have been decreased and increased, respectively. Furthermore, a kind of stickiness has been observed in interbank interest rate. The objective of this paper is to explain the mentioned behaviors by investigating the effects of nonp...

Journal: :J. Inf. Sci. Eng. 2016
Jiguo Li Xuexia Zhao Yichen Zhang Wei Yao

A proxy re-encryption scheme (PRE) allows a semi-trusted proxy to convert a ciphertext encrypted under one key into a ciphertext encrypted under another key without leaking the underlying plaintext. In the process of the arithmetic processing, proxy should be able to learn as little information about the plaintext as possible. Conditional proxy re-encryption (CPRE) is a new cryptography primiti...

2007
Yuan Zhou Binxing Fang Zhenfu Cao Xiaochun Yun Xiaoming Cheng

Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54–63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this pap...

2008
Fengying Li Qingshui Xue Jiping Zhang Zhenfu Cao

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The pr...

1998
Robert Buff Arthur Goldberg Ilya Pevzner

We have designed and validated a rapid, accurate simulation method for evaluating the performance of Web proxy cache replacement algorithm designs. We model the client-proxy-server system by combining a linear model of client-proxy response times with real measurements of proxy-server response times. We experimentally validate the model’s accuracy on the Apache proxy server. Our method should b...

2012
Ziba Eslami Nasrollah Pakniat

A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer’s agreement on the signed message. There exist several certificateless proxy signature schemes in the literature, but all of the...

2007
Wei Wu Yi Mu Willy Susilo Jennifer Seberry Xinyi Huang

A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy signatures have found numerous practical applications such as distributed systems, mobile agent applications, etc. Recently, Xu, Zhang and Feng proposed the first formal models of identity based proxy signature. U...

2012
Karim Chalak Rossella Calvi Daniel Kim

This paper studies measuring the average e¤ects of X on Y in a structural system with random coe¢ cients and confounding. We do not require (conditionally) exogenous regressors or instruments. Using proxies W for the confounders U , we ask how do the average direct e¤ects of U on Y compare in magnitude and sign to those of U on W . Exogeneity and equior proportional confounding are limit case...

2007
Jonathan Witmer Lorie Zorn Toni Gravelle Greg Bauer Michael King Fousseni Chabi-Yo Jun Yang Scott Hendry

This paper estimates the implied cost of equity for Canadian and U.S. firms using a methodology based on the dividend discount model and utilizing firms’ current stock price and analysts’ forecasted earnings. We find that firm size and firm stock liquidity are negatively related to cost of equity, while greater firm financial leverage and greater dispersion in analysts’ earnings forecasts are a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید