نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

2010
Patrícia Lustosa V. Ribeiro Ruy J. G. B. de Queiroz

Identity-based encryption (also known as IBE) is a type of public key cryptography in which the public key of a user is some unique information about his identity. The initial motivation to the creation of IBE was to simplify key management in email systems. An open problem was the creation of a space-efficient IBE scheme that was not based in pairings on elliptic curves. Boneh, Gentry and Hamb...

2016
Robyn B. Broach Rula Geha Brian S. Englander Lucy DeLaCruz Holly Thrash Ari D. Brooks

BACKGROUND With the incidence of breast cancer rising worldwide, we are evaluating the iBreastExam (iBE) (UE LifeSciences Inc.), a handheld breast scanning device that can be utilized by community health workers to screen for breast abnormalities. The purpose of this study is to determine the sensitivity of the iBE in a population undergoing diagnostic breast imaging. METHODS Adult patients p...

2012
Somindu C. Ramanna Sanjit Chatterjee Palash Sarkar

Waters, in 2009, introduced an important technique, called dual-system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters has removed the tags and proceeding th...

2013
Josephine Marie Salverda

The aim of this thesis is to find a way to undermine the indispensability argument for mathematical platonism. In chapter 1 I provide a brief survey of the indispensability argument, arguing that the explanatory indispensability argument is stronger than earlier forms of the argument. This is because it has less controversial premises, appealing neither to confirmational holism nor to a strong ...

2014
Chieh Chiang Chin-Fu Hsiao Jen-Pei Liu Shyamal D. Peddada

Statistical criterion for evaluation of individual bioequivalence (IBE) between generic and innovative products often involves a function of the second moments of normal distributions. Under replicated crossover designs, the aggregate criterion for IBE proposed by the guidance of the U.S. Food and Drug Administration (FDA) contains the squared mean difference, variance of subject-by-formulation...

Journal: :Comparative biochemistry and physiology. Part B, Biochemistry & molecular biology 2014
Alex N Cooper Jason C L Brown James F Staples

Hibernation in 13-lined ground squirrels (Ictidomys tridecemlineatus) is associated with a substantial suppression of whole-animal metabolism. We compared the metabolism of liver mitochondria isolated from torpid ground squirrels with those from interbout euthermic (IBE; recently aroused from torpor) and summer euthermic conspecifics. Succinate-fuelled state 3 respiration, calculated relative t...

Journal: :IACR Cryptology ePrint Archive 2007
Shengbao Wang

Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close organization) maintains its own private key generator (PKG); on the other hand, encryption across domains becomes a prevalent requirement. In this paper, we present a new IBE scheme using bilinear pairings. Compared with the famou...

Journal: :Statistics in medicine 2002
Shein-Chung Chow Jun Shao Hansheng Wang

In recent years, as more generic drug products become available, it is a concern not only whether generic drug products that have been approved based on the regulation of average bioequivalence will have the same quality, safety and efficacy as that of the brand-name drug product, but also whether the approved generic drug products can be used interchangeably. In its recent draft guidance, the ...

2013
Jae Hong Seo Keita Emura

In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functio...

2006
Craig Gentry

We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems – namely, computational efficiency, shorter public parameters, and a “tight” security reduction, albeit to a stronger assumption that depends on the number of private key generation queries made by the adversary. Our assumption is a variant of Bon...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید