نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :The European Physical Journal Plus 2020

Journal: :Spe Journal 2021

Summary A physics-based data-driven model is proposed for forecasting of subsurface energy production. The fully relies on production data and does not require any in-depth knowledge reservoir geology or governing physics. In the approach, we use Delft Advanced Reservoir Terra Simulator (DARTS) as a workhorse simulation. DARTS uses an operator-based linearization technique that exploits abstrac...

Journal: :J. Inf. Sci. Eng. 2016
Jianhong Zhang Jian Mao

As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of m...

2013
ZHU QIANG SUN YUQIANG

To optimize the multimedia proxy server effectively, this paper proposes a gain-based cache replacement policy by using the multimedia proxy server gain model. The performance of the proposed gain-based policy is evaluated by simulation experiments.

Journal: :JCP 2013
Jindan Zhang Xu An Wang Xiaoyuan Yang

In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Identity Based Encryption)(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4). We observe that...

2007
Cheng-Kang Chu Wen-Guey Tzeng

In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...

Journal: :J. Inf. Sci. Eng. 2013
Yen-Ching Lin Tzong-Chen Wu Jia-Lun Tsai

This paper proposes a novel ID-based aggregate proxy signature scheme that realizes a warrant-based delegation for an original signer to transfer his/her signing power to a given set of proxy signers. Our proposed scheme allows n distinct proxy signers to sign n distinct messages in such a way that these n individual signatures can be aggregated into a single one without expansion. In the pract...

Background Many of public hospitals in Japan have had a deficit for a long time. Japanese local governments have been encouraging public hospitals to use group purchasing of drugs to benefit from the economies of scale, and increase their bargaining power for obtaining discounts in drug purchasing, thus improving their financial situation. In this study, we empirically investigate whether or no...

2009
Jun Shao Zhenfu Cao

In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using signature of knowledge and Fijisaki-Okamoto con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید