نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005. However, none of these schemes is proved in the standard model (i.e., do not rely on the random oracle heuristic). In this paper, based on Wa...
A critical challenge in paleoclimate data analysis is the fact that the proxy data are heterogeneously distributed in space, which affects statistical methods that rely on spatial embedding of data. In the paleoclimate network approach nodes represent paleoclimate proxy time series, and links in the network are given by statistically significant similarities between them. Their location in spac...
BACKGROUND AND PURPOSE Proxy respondents are often needed to report outcomes in stroke survivors, but they typically systematically rate impairments worse than patients themselves. The magnitude of this difference, the degree of agreement between patients and proxies, and the factors influencing agreement are not well known. METHODS We compared patient and family proxy health-related quality ...
Background Between 1990 and 2015, under-5 mortality rate (U5MR) declined by 53%, from an estimated rate of 91 deaths per 1000 live births to 43, globally. The aim of this study was to determine the share of health research systems in this decrease alongside other influential factors. Methods We used random effect regression models including the ‘random intercept’ and ‘random intercept and ran...
Objectives: social capital is a concept developed in sociology an also used in business, organizational behavior, political science and economics. In this article the process of social capital formation in a sample of university students is reported. Method: To develop an empirical model, we have assumed that individuals have two kinds of sources to form their social capitals: “identity so...
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bidirectional and any member can independently decrypt the ciphertexts encrypted to its group. We discuss the security of the proposed scheme and show that our scheme withstands chosen ciphertext attack in standard model.
We propose a new unidirectional proxy re-encryption scheme based on lattices. Our construction is collusion-safe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the standard assumption.
In this paper I develop a Proxy Means Tests (PMT) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in Iran. Based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. This will result in the highest accuracy main...
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.
Recently, it has been widely known that deep neural networks are highly vulnerable and easily broken by adversarial attacks. To mitigate the vulnerability, many defense algorithms have proposed. to improve robustness, works try enhance feature representation imposing more direct supervision on discriminative feature. However, existing approaches lack an understanding of learning adversarially r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید