Learning a parametric embedding by preserving local structure

L Van Der Maaten - Artificial intelligence and statistics, 2009 - proceedings.mlr.press
The paper presents a new unsupervised dimensionality reduction technique, called
parametric t-SNE, that learns a parametric map** between the high-dimensional data …

[PDF][PDF] Strong proxy signature and its applications

B Lee, H Kim, K Kim - Proceedings of SCIS, 2001 - cris.joongbu.ac.kr
Proxy signature is a signature scheme that an original signer delegates his/her signing
capability to a proxy signer, and then the proxy signer creates a signature on behalf of the …

Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

[PDF][PDF] Proxy Cryptography Revisited.

AA Ivan, Y Dodis - NDSS, 2003 - Citeseer
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …

Secure mobile agent using strong non-designated proxy signature

B Lee, H Kim, K Kim - Information Security and Privacy: 6th Australasian …, 2001 - Springer
It is expected that mobile agent will be widely used for electronic commerce as an important
key technology. If a mobile agent can sign a message in a remote server on behalf of a …

One-time proxy signature based on quantum cryptography

TY Wang, ZL Wei - Quantum Information Processing, 2012 - Springer
We propose a new one-time proxy signature scheme with decoherence-free states. We
analyze its security and show that it is not possible to forge a valid proxy signature even if an …

Virtual monotonic counters and count-limited objects using a TPM without a trusted OS

LFG Sarmenta, M Van Dijk, CW O'Donnell… - Proceedings of the first …, 2006 - dl.acm.org
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly
scalable offline and decentralized applications that would otherwise be prone to replay …

ID-based proxy signature using bilinear pairings

J Xu, Z Zhang, D Feng - … and Distributed Processing and Applications-ISPA …, 2005 - Springer
Abstract Identity-based (ID-based) public key cryptosystem can be a good alternative for
certificate-based public key setting, especially when efficient key management and …

(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions

J Claessens, B Preneel, J Vandewalle - ACM Transactions on Internet …, 2003 - dl.acm.org
This article investigates if and how mobile agents can execute secure electronic transactions
on untrusted hosts. An overview of the security issues of mobile agents is first given. The …

[HTML][HTML] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

SKH Islam, GP Biswas - Journal of King Saud University-Computer and …, 2014 - Elsevier
The proxy signature, a variant of the ordinary digital signature, has been an active research
topic in recent years; it has many useful applications, including distributed systems and grid …