Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure proxy signature schemes for delegation of signing rights
A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …
schemes have been suggested for use in numerous applications, particularly in distributed …
An efficient mobile authentication scheme for wireless networks
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …
Identity-based proxy signature from pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity
(proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy …
(proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy …
Proxy signatures secure against proxy key exposure
JCN Schuldt, K Matsuura, KG Paterson - International Workshop on Public …, 2008 - Springer
We provide an enhanced security model for proxy signatures that captures a more realistic
set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is …
set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is …
Proxy signature without random oracles
Abstract In mobile Ad Hoc networks, the existence and availability of trusted authorities is
severely limited by intrinsic network features, and problems such as “service availability” …
severely limited by intrinsic network features, and problems such as “service availability” …
Research on evaluation index and application of rockburst risk in deep strip mining
B Jiang, H Ji, L Fu, S Gu, T Zou, J Lu - Shock and Vibration, 2020 - Wiley Online Library
The practice shows that deep strip mining induces rockburst disaster easily. Accurately
evaluating rockburst risk of the strip coal pillar is of great significance for ensuring the safety …
evaluating rockburst risk of the strip coal pillar is of great significance for ensuring the safety …
Designated-verifier proxy signature schemes
G Wang - Security and Privacy in the Age of Ubiquitous …, 2005 - Springer
In a proxy signature scheme, a user delegates his/her signing capability to another user in
such a way that the latter can sign messages on behalf of the former. In this paper, we first …
such a way that the latter can sign messages on behalf of the former. In this paper, we first …
Mobile privacy in wireless networks-revisited
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
With the widespread use of mobile devices, the privacy of mobile location information
becomes an important issue. In this paper, we present the requirements on protecting …
becomes an important issue. In this paper, we present the requirements on protecting …
Designated-verifier proxy signatures for e-commerce
G Wang - 2004 IEEE International Conference on Multimedia …, 2004 - ieeexplore.ieee.org
In a designated-verifier proxy signature scheme, a user delegates her/his signing capability
to another user in such a way that the latter can sign messages on behalf of the former, but …
to another user in such a way that the latter can sign messages on behalf of the former, but …
Aggregate proxy signature and verifiably encrypted proxy signature
An aggregate signature is a single short string that convinces any verifier that, for all 1≤ i≤
n, signer i signed message mi, where the n signers and n messages are distinct. The main …
n, signer i signed message mi, where the n signers and n messages are distinct. The main …