Showing 21 - 40 results of 743 for search 'Uproxx~', query time: 4.11s Refine Results
  1. 21
  2. 22

    Partially blind proxy re-signature scheme with proven security by Xiaodong YANG, Chunlin CHEN, Ping YANG, Faying AN, Tingchun MA, Caifen WANG

    Published 2018-02-01
    Subjects: “…partially blind proxy re-signature…”
    Get full text
    Article
  3. 23

    RLWE-based ciphertext-policy attribute proxy re-encryption by En ZHANG, Yaoyao PEI, Jiao DU

    Published 2018-11-01
    Subjects: “…proxy re-encryption…”
    Get full text
    Article
  4. 24

    Design, implementation and formal verification of BGP proxy for mimic router by Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU

    Published 2023-03-01
    “…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
    Get full text
    Article
  5. 25
  6. 26

    Streamflow prediction using artificial neural networks and soil moisture proxies by Robert Edwin Rouse, Doran Khamis, Scott Hosking, Allan McRobie, Emily Shuckburgh

    Published 2025-01-01
    “…By highlighting this capability to learn effectively using proxy variables, we demonstrate a more transferable framework that minimizes sensing requirements and that enables a route toward generalizing models.…”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30

    Relationships Between foF2 and Various Solar Activity Proxies by Jan Laštovička, Dalia Burešová

    Published 2023-04-01
    Subjects: “…solar activity proxies…”
    Get full text
    Article
  11. 31
  12. 32

    Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) by Celina Gomez, Russell F. Mizell, III

    Published 2009-04-01
    “…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
    Get full text
    Article
  13. 33

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organizations. Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
    Get full text
    Article
  14. 34

    Self-defence model of SIP proxy server for against DoS attack by ZHANG Zhao-xin, DU Yue-jin, LI Bin, ZHANG Hong-li

    Published 2009-01-01
    “…Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.…”
    Get full text
    Article
  15. 35

    Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) by Celina Gomez, Russell F. Mizell, III

    Published 2009-04-01
    “…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38

    ID-based efficient and proactive threshold proxy signature in the standard model by YU Yi-ke1, ZHENG Xue-feng2

    Published 2011-01-01
    Subjects: “…proactive threshold proxy signature…”
    Get full text
    Article
  19. 39
  20. 40