نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. In this paper we show various attack scenarios against previous proxy signature schemes, which shows that proxy signature schemes should be designed very carefully. Based on these weaknesses, we prov...
In the past few years, many excellent studies on proxy signature schemes have been published. Yet, traditional proxy signature schemes are mainly aimed at dealing with one or two separate proxy conditions each. In this article, the authors shall present a generalized version of the (t1/n1 – t2/n2) proxy signature scheme based on the discrete logarithms that can be applied to every proxy situati...
Numerous studies show that proxy cache miss ratios are typically at least 40%-50%. This paper proposes and evaluates a new approach for improving the throughput of proxy caches by reducing cache miss overheads. An embedded system able to achieve sig-niicantly better communications performance than a traditional proxy lters the requests directed to a proxy cache, forwarding the hits to the proxy...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-...
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we ...
X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography ...
The present study considered the situation of kilka stocks in last decades by using overfished biomass threshold, fishing effort ratio and fishing mortality proxy during 1991-2010. The CPUE index of anchovy and mixed-species of kilka indicated an undepleted from 1991 to 2000. In 2000, the CPUE ratio declined to close to the “in danger” region, and subsequently collapsed to “overfished” region f...
The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identitybased multi-proxy signature, proxy multi-signature and multi-proxy mult...
In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید