• No results found

Batch Verification

Weighted Priority Based Signatures' Batch Verification Scheme in Vehicular Ad-Hoc Networks

Weighted Priority Based Signatures' Batch Verification Scheme in Vehicular Ad-Hoc Networks

... and batch verification. But the author stated that since the batch verification scheme is subject to false signatures attack, it is better to use priority based signature verification ...

5

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

... a batch verification Authentication and Key Agreement (AKA) protocol, BVPSMS, which provides end-to-end message security over an insecure communication channel between different Mobile Subscribers ...and ...

15

Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network

Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network

... designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance ...

5

Comparison of Different Cryptography Approach for Secure Communication in Vehicular AD-Hoc Network

Comparison of Different Cryptography Approach for Secure Communication in Vehicular AD-Hoc Network

... b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Senior Member, IEEE, XianWang, Tianrui Li, Senior Member, IEEE, and ...

5

International Journal of Scientific Research and Modern Education (IJSRME) (ISSN (Online): 2455 – 5630) Volume I, Issue I, 2016

International Journal of Scientific Research and Modern Education (IJSRME) (ISSN (Online): 2455 – 5630) Volume I, Issue I, 2016

... the verification cost, which is critical to ADS-B systems, since at any time an ADS-B receiver may receive lots of ...partial batch verification and the extended scheme provides full batch ...

6

Faster  batch  forgery  identification

Faster batch forgery identification

... For elliptic-curve signatures at a 2 b security level it is standard practice to use about 2b bits for hashes, scalars, and field elements, and to compress points to single coordinates. EdDSA and Schnorr’s system then ...

20

SECURE ROUTING AND DATA VERIFICATION UNDER WIRELESS SENSOR NETWORKS

SECURE ROUTING AND DATA VERIFICATION UNDER WIRELESS SENSOR NETWORKS

... scheme for confidentiality between OA and users. In EPPA, data aggregation is performed directly on cipher texts at local gateways without decryption, and the aggregation result of the original data can be obtained at ...

7

A Survey on Various Security Schemes in Vehicular Ad hoc Network

A Survey on Various Security Schemes in Vehicular Ad hoc Network

... Main contribution in this paper is identity based signature (IBS) scheme under computational DiffeHellman (CDH) assumption. This scheme uses general hash functions, instead of using an inefficient special function known ...

6

SVM based Signature Verification by Fusing Global and Functional Features

SVM based Signature Verification by Fusing Global and Functional Features

... In general, function-based features show better discriminating ability than the parameter-based features but they usually require time-consuming algorithm for comparison. However, the work by Aguilar et al. reported that ...

6

3D convolutional GAN for fast simulation

3D convolutional GAN for fast simulation

... size. Batch normalization layers for regular- ization and leaky rectified linear units activation functions are used to take into account the level of sparsity of the input ...

8

Tool planning in batch manufacturing

Tool planning in batch manufacturing

... This research work encompasses the detailed study of a typical tool management system and its primary functions and extends the work on tool planning in batch manufacturing.... With the [r] ...

193

Artificial Intelligence with Verifiable Digital Signature Patterns

Artificial Intelligence with Verifiable Digital Signature Patterns

... reliable verification or reorganization we should utilize something that truly characterizes the given individual ...identity verification or recognition on the standard of measurable physiological or ...

10

Optimization of a Product Batch Quantity

Optimization of a Product Batch Quantity

... optimal batch quantity of a product (production is within the company) using the known basic and developed extended models; the latter, in addition to the costs of changing the batch ...

8

Batch scheduling on a single machine with

Batch scheduling on a single machine with

... processing time (SPT) order is proved the optimal scheduling rule of SMBSP-MI,. 91[r] ...

17

Containerized Batch System Monitoring

Containerized Batch System Monitoring

... and batch system statistics. The script reads HTCondor batch job information details from the file sys- tem as well as the jobs process details created at start under ...

7

System Development Of An Initiation Sequence Using Face Recognition Technology

System Development Of An Initiation Sequence Using Face Recognition Technology

... tokens, passwords and keys, biometric systems are being deployed to enhance security and reduce fraud. In designing a practical biometric system, a user must first be enrolled in the system so that his biometric template ...

24

Glycolysis and the regulation of glucose transport in Lactococcus lactis spp. lactis in batch and fed-batch culture

Glycolysis and the regulation of glucose transport in Lactococcus lactis spp. lactis in batch and fed-batch culture

... of batch fermentations with 5 % DOT, in which the concentration of glucose in the medium differed within the range of ...in batch culture, observations unavoidably include the effects of a continuously ...

13

Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

... To overcome this problem in batch operation, fed- batch enzymatic hydrolysis was implemented. This approach exploits the property of cellulose solubilization during the enzymatic hydrolysis to increase the ...

10

Impact Of Wide Variety Feature On Accuracy Of Offline Signature Verification Using Distance Of Mass Centroid

Impact Of Wide Variety Feature On Accuracy Of Offline Signature Verification Using Distance Of Mass Centroid

... forgery verification is difficult to be verified because of the highest similarity between genuine and forgery ...signature verification is conducted by two ...first verification will be ...

6

Biometric Image Recognition by Fusion of Multiple Parameters with Latest Trends

Biometric Image Recognition by Fusion of Multiple Parameters with Latest Trends

... identity verification of persons according to their physical or behavioural ...Person verification based on biometric features has attracted more attention in designing security systems ...

9

Show all 4175 documents...

Related subjects