نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
Proxy system modeling can be used in paleoclimatology to improve the interpretation of paleoclimate data. Existing forward models for climate proxies are somewhat scattered in the literature, making their integration difficult. Further, each model has been coded separately, according to disparate conventions. Here, we present a comprehensive, consistently formatted package of forward models for...
Constructing efficient (Hierarchical) identity based signature/signcryption ((H)IBS/IBSC) schemes in the standard model with full security remain as open problems for a long time. Ren et al. constructed efficient (H)IBS/IBSC schemes with full security without random oracle in ISDPE’07 and Chinacrypt’08, . They claimed their schemes can be proved to simultaneously achieve high efficiency, short ...
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexibility of signers within organizations and among entities). On the other hand, various notions of the key-evolving signature paradigms (forward-secure, key-insulated, and intrusion-resilient signatures) have been sugge...
this paper using endogenous growth models based on research and development, has investigated two economic relations in three groups of countries included developed countries, developing countries and a mixed group of both mentioned ones. at first, the effects of r&d; activities on patent growth have examined and then the relation between volume of patent and growth rate in these groups has sur...
This paper is devoted to the theoretical analysis of a problem derived from interaction between two Iplanet products: Web Proxy Server and the Directory Server. In particular, a probabilistic and stochasticapproximation model is proposed to minimize the occurrence of LDAP connection failures in Iplanet Web Proxy 3.6 Server. The proposed model serves not only to provide a parameterization of the...
For the Tortonian (Late Miocene, 11 to 7 Ma), we present a model simulation using the atmospheric general circulation model (AGCM) ECHAM4 coupled to a mixed-layer (ML) ocean model. The Tortonian simulation with ECHAM4/ML includes an adjusted weaker than present ocean heat transport, a generally lower palaeorography and an appropriate palaeovegetation. We analyse the climatic differences between...
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we f...
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of certificateless public key cryptography was int...
Proxy servers are common solutions to relieve organizational networks from heavy traffic by storing the most frequently referenced web objects in their local cache. These proxies are commonly known as cooperative proxy systems and are usually organized in such a way as to optimize the utilization of their storage capacity. A self-organized approach to manage a distributed proxy system called Ad...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید