نتایج جستجو برای: آزمون re
تعداد نتایج: 295481 فیلتر نتایج به سال:
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the del...
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current co...
Introduction: The palliative care in patients with bone metastasis includes variety of techniques such as conventional analgesics, surgery, external beam radiotherapy, hormone therapy, chemotherapy and using bone-seeking radiopharmaceuticals. Even some of the recent works used combined methods like chemotherapy and radionuclide therapy or using radionuclide therapy as adjuvant ...
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.
We consider a two-queue polling model with switch-over times and k-limited service (serve at most ki customers during one visit period to queue i) in each queue. The major benefit of the k-limited service discipline is that it besides bounding the cycle time effectuates prioritization by assigning different service limits to different queues. System performance is studied in the heavy-traffic r...
Robotica / FirstView Article / July 2014, pp 1 24 DOI: 10.1017/S0263574714001921, Published online: 22 July 2014 Link to this article: http://journals.cambridge.org/abstract_S0263574714001921 How to cite this article: Patrice Boucher Waypoints guidance of differential-drive mobile robots with kinematic and precision constraints. Robotica, Available on CJO 2014 doi:10.1017/S0263574714001921 Requ...
The effect of the rotational speed and axial torque on the diagnostics of tapered rolling element bearing defects was investigated. The accelerometer was mounted on the bearing housing and connected to Sound and Vibration Analyzer (SVAN 958) and was used to measure the accelerations from the bearing housing. The data obtained from the bearing was processed to detect damage of the bearing using ...
Individuals attribute more psychological (e.g., forget) than biological (e.g., eat) or physical (e.g., be touched) properties to supernatural beings (Shtulman, 2008). It is unclear how those domains each contribute to an overall conception of a supernatural being (e.g., God). Undergraduate students (N = 341) responded to nine questions representing the three domains or factors (psychological, b...
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any othe...
In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext by a proxy, and thus can detect illegal acti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید