|
|
|
Shaonan Hou, Chengjun Lin and Shaojun Yang
A transitive signature scheme enables anyone to obtain the signature on edge (??,??)
(
i
,
k
)
by combining the signatures on edges (??,??)
(
i
,
j
)
and (??,??)
(
j
,
k
)
, but it suffers from signature theft and signature abuse. The existing work has...
ver más
|
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
|
Faisal Mahmood, Seyed M. Hashemi and Hekmat Alighanbari
Growing concerns over the CO2 footprint due the exponential demand of the aviation industry, along with the requirements for high aerodynamic performance, cost saving, and manoeuvrability during different phases of a flight, pave the path towards adaptab...
ver más
|
|
|
|
|
|
|
Marta Tremolada, Lucio Silingardi and Livia Taverna
The evolution of digital media has changed the patterns and motives for its use among adolescents and has impacted their communication choices within their family and social networks. The objectives of this study are to understand whether peers communica...
ver más
|
|
|
|
|
|
|
Baocheng Wang and Zetao Li
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the g...
ver más
|
|
|
|
|
|
|
Shingchern D. You and Ming-Jen Hung
This paper studies the use of three different approaches to reduce the dimensionality of a type of spectral?temporal features, called motion picture expert group (MPEG)-7 audio signature descriptors (ASD). The studied approaches include principal compone...
ver más
|
|
|
|
|
|
|
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending...
ver más
|
|
|
|
|
|
|
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono
Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an...
ver más
|
|
|
|
|
|
|
Frédéric-Victor Donzé, Laurent Truche, Parisa Shekari Namin, Nicolas Lefeuvre and Elena F. Bazarkina
Hydrogen gas is seeping from the sedimentary basin of São Franciso, Brazil. The seepages of H2 are accompanied by helium, whose isotopes reveal a strong crustal signature. Geophysical data indicates that this intra-cratonic basin is characterized by (i) ...
ver más
|
|
|
|
|
|
|
Donghoe Heo, Suhri Kim, Young-Ho Park and Seokhie Hong
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange al...
ver más
|
|
|
|