نتایج جستجو برای: regions were designated

تعداد نتایج: 3713491  

Journal: :Journal of Information Processing 2011

2009
Daniel Wichs

Last Time: Simulation Sound NIZKS & Connection to CCA Security. Last time we introduced Simulation-Sound NIZKs, and constructed a 1-Time Simulation Sound NIZK (1-SS NIZK). We then showed how to get CCA secure encryption from CPA encryption and NIZKs in one of two ways: using standard NIZK and n copies of a CPA encryption scheme ([DDN00]) or using 1-SS NIZK and 2 copies of a CPA encryption schem...

2004
Emmanuel Dall'Olio Olivier Markowitch

We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other unspecified entities, and therefore cannot be forced to do so. The scheme is based on the concept of strong designated verifier signature scheme, and is very cheap in both computation and data communication, regarding ...

Journal: :Computer Standards & Interfaces 2008
Seung-Hyun Seo Jung Yeon Hwang Kyu Young Choi Dong Hoon Lee

An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simplified public identity such as e-mail address. In the paper, we present an efficient identity-based universal designated multi-verifiers signature (ID-UDMVS) scheme by extending a single verifier to a set of multi-verifi...

Journal: :Clinical journal of oncology nursing 2014
Leah A Scaramuzzo Janet Gordils-Perez Patsy McGuire Cullen

Data from a National Cancer Institute-designated comprehensive cancer center taking part in the ONS Foundation-supported Breast Cancer Care Quality Measures Set pilot study revealed a lack of interventions recommended for patient-reported symptoms of fatigue. A team was formed to address the issue using the steps of the evidence-based practice process and to implement practice changes. This art...

Journal: :IACR Cryptology ePrint Archive 2006
Phani Kumar Kancharla Shailaja Gummadidala Ashutosh Saxena

Identity based cryptosystem simplifies the key management and revocation problem. Here we propose an Identity Based Strong Designated Verifier Signature (IBSDVS) scheme using bilinear pairings. The Designated Verifier Signature scheme described in [10] is identity based but it suffers from the deligatability as pointed out in [4]. We analyse the security of the scheme and show that the problem ...

Journal: :Nucleic acids research 1985
A M Fulton J Mellor M J Dobson J Chester J R Warmington K J Indge S G Oliver P de la Paz W Wilson A J Kingsman

The Ty transposable elements of Saccharomyces cerevisiae form a heterogeneous family within which two broad structural classes (I and II) exist. The two classes differ by two large substitutions and many restriction sites. We show that, like class I elements a class II element, Tyl-17, also appears to contain at least two major protein coding regions, designated TYA and TYB, and the organisatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید