نتایج جستجو برای: توالی تکرارشونده re

تعداد نتایج: 183156  

2007
Cheng-Kang Chu Wen-Guey Tzeng

In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...

Journal: :J. Inf. Sci. Eng. 2011
Zhong-Mei Wan Jian Weng Xuejia Lai Shengli Liu Jiguo Li

ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240, P.R. China College of Science Department of Computer Science Hohai University Nanjing 210098, P.R. China E-mail: [email protected] Department of Computer Science Jinan University Guangzhou 510630, P.R. China School of Information System...

2008
Qiang Tang Pieter H. Hartel Willem Jonker

Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the del...

Journal: :IJCMAM 2010
Luan Ibraimi Qiang Tang Pieter H. Hartel Willem Jonker

Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current co...

Introduction: The palliative care in patients with bone metastasis includes variety of techniques such as conventional analgesics, surgery, external beam radiotherapy, hormone therapy, chemotherapy and using bone-seeking radiopharmaceuticals. Even some of the recent works used combined methods like chemotherapy and radionuclide therapy or using radionuclide therapy as adjuvant ...

2010
Wei-Chuen Yau Raphael C.-W. Phan Swee-Huay Heng Bok-Min Goi

We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.

Journal: :EAI Endorsed Trans. Collaborative Computing 2016
Marko A. A. Boon Erik M. M. Winands

We consider a two-queue polling model with switch-over times and k-limited service (serve at most ki customers during one visit period to queue i) in each queue. The major benefit of the k-limited service discipline is that it besides bounding the cycle time effectuates prioritization by assigning different service limits to different queues. System performance is studied in the heavy-traffic r...

Journal: :Robotica 2016
Patrice Boucher

Robotica / FirstView Article / July 2014, pp 1 24 DOI: 10.1017/S0263574714001921, Published online: 22 July 2014 Link to this article: http://journals.cambridge.org/abstract_S0263574714001921 How to cite this article: Patrice Boucher Waypoints guidance of differential-drive mobile robots with kinematic and precision constraints. Robotica, Available on CJO 2014 doi:10.1017/S0263574714001921 Requ...

2012

The effect of the rotational speed and axial torque on the diagnostics of tapered rolling element bearing defects was investigated. The accelerometer was mounted on the bearing housing and connected to Sound and Vibration Analyzer (SVAN 958) and was used to measure the accelerations from the bearing housing. The data obtained from the bearing was processed to detect damage of the bearing using ...

2016
Nicholas Shaman Anondah Saide Rebekah Richert

Individuals attribute more psychological (e.g., forget) than biological (e.g., eat) or physical (e.g., be touched) properties to supernatural beings (Shtulman, 2008). It is unclear how those domains each contribute to an overall conception of a supernatural being (e.g., God). Undergraduate students (N = 341) responded to nine questions representing the three domains or factors (psychological, b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید