Local multiscale frequency and bandwidth estimation
This paper describes a robust algorithm for estimation of local signal frequency and
bandwidth. The method is based on combining local estimates of instantaneous frequency …
bandwidth. The method is based on combining local estimates of instantaneous frequency …
A family of fast syndrome based cryptographic hash functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions
[20, 21] including some of the most widely used today. Many other hash functions using …
[20, 21] including some of the most widely used today. Many other hash functions using …
On the security of some proxy blind signature schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties
of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy …
of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy …
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
X Li, K Chen - Applied Mathematics and Computation, 2005 - Elsevier
In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy
signatures can combine other special signatures to obtain some new types of proxy …
signatures can combine other special signatures to obtain some new types of proxy …
User-space communication: A quantitative study
Powerful commodity systems and networks offer a promising direction for high performance
computing because they are inexpensive and they closely track technology progress …
computing because they are inexpensive and they closely track technology progress …
[PDF][PDF] ID-based multi-proxy signature and blind multisignature from bilinear pairings
Multi-proxy signature allows the original signer delegate his singing power to a group of
proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from …
proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from …
Designated verifier proxy signature scheme with message recovery
Proxy signature is an active cryptographic research area. In recent years, many proxy
signature schemes to suggest improvement and generalization of existing protocols have …
signature schemes to suggest improvement and generalization of existing protocols have …
Algorithms and approaches of proxy signature: A survey
arxiv:cs/0612098v1 [cs.CR] 20 Dec 2006 Page 1 arxiv:cs/0612098v1 [cs.CR] 20 Dec 2006
Algorithms and Approaches of Proxy Signature: A Survey MANIK LAL DAS Dhirubhai Ambani …
Algorithms and Approaches of Proxy Signature: A Survey MANIK LAL DAS Dhirubhai Ambani …
Blockchain applications beyond the cryptocurrency casino: The Punishment not Reward blockchain architecture
R Banach - Concurrency and Computation: Practice and …, 2021 - Wiley Online Library
The Bitcoin model originated blockchain architectures and inspired their further
development. Blockchain architectures are still most commonly associated with currency …
development. Blockchain architectures are still most commonly associated with currency …
Provable secure identity‐based multi‐proxy signature scheme
Multi‐proxy signature is one of the useful primitives of the proxy signature. Till now, only a
few schemes of identity‐based multi‐proxy signature (IBMPS) have been proposed using …
few schemes of identity‐based multi‐proxy signature (IBMPS) have been proposed using …