نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :فقه و اصول 0

if the agent, who has the right to appoint a proxy, exercises his right and appoints another person for pursuing the subject of agency, the appointed person is not the agent of the appointer; rather, he is regarded as the indirect agent of the client. therefore, if the object of agency is conclusion of a transaction contract and the indirect proxy concludes it, that [contract] belongs to the cl...

2010
Jun Shao Min Feng Bin B. Zhu Zhenfu Cao Peng Liu

In proxy re-signature (PRS), a semi-trusted proxy, with some additional information (a.k.a., re-signature key), can transform Alice’s (delegatee) signature into Bob’s (delegator) signature on the same message, but cannot produce an arbitrary signature on behalf of either the delegatee or the delegator. In this paper, we investigate the security model of proxy re-signature, and find that the pre...

2014
BENEDETTO MANGANELLI PIERLUIGI MORANO FRANCESCO TAJANI

— The sale and lease real estate markets have cyclical developments which are often dissimilar in the short term and then take coincident trends in longer horizons. The imbalance in the relationship between prices and income is normally used by economists to determine any "housing bubbles". However, the structural limitations require caution in the use of the ratio between prices and rents as a...

Journal: :IACR Cryptology ePrint Archive 2013
Rahim Toluee Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh

In order to protect the proxy signers’ privacy, many anonymous proxy signature schemes which are also called proxy ring signatures, have been proposed. Although the provable security in the random oracle model has received a lot of criticism, there is no provable secure anonymous proxy signature scheme without random oracles. In this paper, we propose the first provable secure anonymous proxy s...

2008
Philip Ward

We have coupled a climate model (ECBilt-CLIO-VECODE) and a hydrological model (STREAM) offline to simulate the palaeodischarge of 19 rivers (Amazon, Congo, Danube, Ganges, Krishna, Lena, Mackenzie, Mekong, Meuse, Mississippi, Murray-Darling, Nile, Oder, Rhine, Sacramento-San Joaquin, Syr Darya, Volga, Volta, Zambezi) for three time-slices: Early Holocene (9000-8650 BP), Mid Holocene (6200-5850 ...

2010
Matthew Huber R. Caballero

The early Eocene “equable climate problem”, i.e. warm extratropical annual mean and above-freezing winter temperatures evidenced by proxy records, has remained as one of the great unsolved problems in paleoclimate. Recent progress in modeling and in paleoclimate proxy development provides an opportunity to revisit this problem to ascertain if the current generation of models can reproduce the p...

Journal: :J. Applied Mathematics 2012
Baoyuan Kang

In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designat...

2010
Maite Bauwens Henrik Ohlsson M. Bauwens H. Ohlsson K. Barbé

A long standing problem in paleoceanography concerns the reconstruction of water temperature from δ18O carbonate. It is problematic in the case of freshwater influenced environments because the δ18O isotopic composition of the ambient water (related to salinity) needs to be known. In this paper we argue for the use of a nonlinear multi-proxy method called Weight Determination by Manifold Regula...

Journal: :Web Intelligence and Agent Systems 2003
James Zijun Wang Ratan K. Guha

Proxy servers have been widely used by institutions to serve their clients behind firewalls. Recently many schemes have been proposed to organize the proxy servers into a cooperative proxy cache system. However most of existing proxy cache schemes require manual configuration of the cooperative proxies based on the network architecture. In this paper, we propose a novel P2P proxy caching scheme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید