نتایج جستجو برای: توالی تکرارشونده re
تعداد نتایج: 183156 فیلتر نتایج به سال:
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...
ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240, P.R. China College of Science Department of Computer Science Hohai University Nanjing 210098, P.R. China E-mail: [email protected] Department of Computer Science Jinan University Guangzhou 510630, P.R. China School of Information System...
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the del...
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current co...
Introduction: The palliative care in patients with bone metastasis includes variety of techniques such as conventional analgesics, surgery, external beam radiotherapy, hormone therapy, chemotherapy and using bone-seeking radiopharmaceuticals. Even some of the recent works used combined methods like chemotherapy and radionuclide therapy or using radionuclide therapy as adjuvant ...
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.
We consider a two-queue polling model with switch-over times and k-limited service (serve at most ki customers during one visit period to queue i) in each queue. The major benefit of the k-limited service discipline is that it besides bounding the cycle time effectuates prioritization by assigning different service limits to different queues. System performance is studied in the heavy-traffic r...
Robotica / FirstView Article / July 2014, pp 1 24 DOI: 10.1017/S0263574714001921, Published online: 22 July 2014 Link to this article: http://journals.cambridge.org/abstract_S0263574714001921 How to cite this article: Patrice Boucher Waypoints guidance of differential-drive mobile robots with kinematic and precision constraints. Robotica, Available on CJO 2014 doi:10.1017/S0263574714001921 Requ...
The effect of the rotational speed and axial torque on the diagnostics of tapered rolling element bearing defects was investigated. The accelerometer was mounted on the bearing housing and connected to Sound and Vibration Analyzer (SVAN 958) and was used to measure the accelerations from the bearing housing. The data obtained from the bearing was processed to detect damage of the bearing using ...
Individuals attribute more psychological (e.g., forget) than biological (e.g., eat) or physical (e.g., be touched) properties to supernatural beings (Shtulman, 2008). It is unclear how those domains each contribute to an overall conception of a supernatural being (e.g., God). Undergraduate students (N = 341) responded to nine questions representing the three domains or factors (psychological, b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید