-
21
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: “…proxy re-encryption…”
Get full text
Article -
22
Partially blind proxy re-signature scheme with proven security
Published 2018-02-01Subjects: “…partially blind proxy re-signature…”
Get full text
Article -
23
RLWE-based ciphertext-policy attribute proxy re-encryption
Published 2018-11-01Subjects: “…proxy re-encryption…”
Get full text
Article -
24
Design, implementation and formal verification of BGP proxy for mimic router
Published 2023-03-01“…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
Get full text
Article -
25
Concept and Significance of Criminalistics Classification of Crimes Related to Proxy Battle
Published 2019-09-01Subjects: Get full text
Article -
26
Streamflow prediction using artificial neural networks and soil moisture proxies
Published 2025-01-01“…By highlighting this capability to learn effectively using proxy variables, we demonstrate a more transferable framework that minimizes sensing requirements and that enables a route toward generalizing models.…”
Get full text
Article -
27
A basin‐wide carbon‐related proxy dataset in arid China
Published 2025-01-01Subjects: Get full text
Article -
28
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: Get full text
Article -
29
Revocable identity-based proxy re-signature scheme in the standard model
Published 2019-05-01Subjects: “…identity-based proxy re-signature…”
Get full text
Article -
30
Relationships Between foF2 and Various Solar Activity Proxies
Published 2023-04-01Subjects: “…solar activity proxies…”
Get full text
Article -
31
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01Subjects: Get full text
Article -
32
Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae)
Published 2009-04-01“…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
Get full text
Article -
33
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organizations. Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
Get full text
Article -
34
Self-defence model of SIP proxy server for against DoS attack
Published 2009-01-01“…Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.…”
Get full text
Article -
35
Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae)
Published 2009-04-01“…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
Get full text
Article -
36
Proxy caching algorithm based on segment popularity for mobile streaming media
Published 2007-01-01Subjects: Get full text
Article -
37
US – Iran Proxy War in Middle East Under Trump Administration
Published 2021-07-01Subjects: Get full text
Article -
38
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: “…proactive threshold proxy signature…”
Get full text
Article -
39
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: Get full text
Article -
40
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: “…proxy re-encryption…”
Get full text
Article