Learning a parametric embedding by preserving local structure
L Van Der Maaten - Artificial intelligence and statistics, 2009 - proceedings.mlr.press
The paper presents a new unsupervised dimensionality reduction technique, called
parametric t-SNE, that learns a parametric map** between the high-dimensional data …
parametric t-SNE, that learns a parametric map** between the high-dimensional data …
[PDF][PDF] Strong proxy signature and its applications
Proxy signature is a signature scheme that an original signer delegates his/her signing
capability to a proxy signer, and then the proxy signer creates a signature on behalf of the …
capability to a proxy signer, and then the proxy signer creates a signature on behalf of the …
Secure proxy signature schemes for delegation of signing rights
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …
schemes have been suggested for use in numerous applications, particularly in distributed …
[PDF][PDF] Proxy Cryptography Revisited.
AA Ivan, Y Dodis - NDSS, 2003 - Citeseer
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …
Secure mobile agent using strong non-designated proxy signature
It is expected that mobile agent will be widely used for electronic commerce as an important
key technology. If a mobile agent can sign a message in a remote server on behalf of a …
key technology. If a mobile agent can sign a message in a remote server on behalf of a …
One-time proxy signature based on quantum cryptography
TY Wang, ZL Wei - Quantum Information Processing, 2012 - Springer
We propose a new one-time proxy signature scheme with decoherence-free states. We
analyze its security and show that it is not possible to forge a valid proxy signature even if an …
analyze its security and show that it is not possible to forge a valid proxy signature even if an …
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
LFG Sarmenta, M Van Dijk, CW O'Donnell… - Proceedings of the first …, 2006 - dl.acm.org
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly
scalable offline and decentralized applications that would otherwise be prone to replay …
scalable offline and decentralized applications that would otherwise be prone to replay …
ID-based proxy signature using bilinear pairings
J Xu, Z Zhang, D Feng - … and Distributed Processing and Applications-ISPA …, 2005 - Springer
Abstract Identity-based (ID-based) public key cryptosystem can be a good alternative for
certificate-based public key setting, especially when efficient key management and …
certificate-based public key setting, especially when efficient key management and …
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
This article investigates if and how mobile agents can execute secure electronic transactions
on untrusted hosts. An overview of the security issues of mobile agents is first given. The …
on untrusted hosts. An overview of the security issues of mobile agents is first given. The …
[HTML][HTML] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
The proxy signature, a variant of the ordinary digital signature, has been an active research
topic in recent years; it has many useful applications, including distributed systems and grid …
topic in recent years; it has many useful applications, including distributed systems and grid …