• No results found

off-line e-cash scheme

An Off-line E-Cash Scheme based on Group Blind Signature Scheme

An Off-line E-Cash Scheme based on Group Blind Signature Scheme

... signature scheme inwhich an individual can sign a document ormessage onbehalf of entire ...Our scheme combines the already existing notions of blind signatures and group ...Signature Scheme [12] that ...

8

ELLIPTIC  CURVE BASED UNTRACEABLE OFF-LINE ELECTRONIC CASH SYSTEM

ELLIPTIC CURVE BASED UNTRACEABLE OFF-LINE ELECTRONIC CASH SYSTEM

... the scheme proposed by Ziba Eslami [16] as base work, an untraceable off-line e-cash scheme using elliptic curves is ...signature scheme is employed so that if a coin is ...

10

A Simple Off-line E-Cash System with Observers

A Simple Off-line E-Cash System with Observers

... divisible e-cash system proven secure in random oracle and standard models where the bandwidth of each protocol is constant was presented in ...conditional e-payment system based on restrictive ...

11

An electronic cash scheme and its management

An electronic cash scheme and its management

... is off-line if the shop does not communicate with the bank during ...on-line e-cash, double-spending is prevented by having the bank check if the coin has been deposited ...In ...

29

Divisible  E-Cash  Made  Practical

Divisible E-Cash Made Practical

... divisible E-cash which can be in- stantiated and proven secure in both the random oracle and standard ...divisible E-cash systems achieving weaker notions of anonymity (such as unlinkability) ...

21

ANN Implementation for Classification of Noisy Numeral Corrupted By Salt and Pepper Noise

ANN Implementation for Classification of Noisy Numeral Corrupted By Salt and Pepper Noise

... The importance of using a hierarchical network is shown in literature [9] Seong-Whan Lee finds a new scheme for off-line recognition of totally unconstrained handwritten [r] ...

5

Improved Collecting Line Current Protection Scheme against Large-scale Wind Generators Tripping off

Improved Collecting Line Current Protection Scheme against Large-scale Wind Generators Tripping off

... L ARGE -scale grid-connected wind power is of great significance to ease energy shortage and promote the development of green energy [1]-[4]. With the continuous increasing permeability of wind power, the security ...

13

A short history off-line

A short history off-line

... of e-institutions such as the UK eUniversity or the National Health Service University, both casualties in the ...of e-institutions needs invention and responsiveness without sacrificing rigour and ...

22

Attitudes and behavioural responses to measures to deal with workplace parking

Attitudes and behavioural responses to measures to deal with workplace parking

... ‘cash-out’ scheme, an employer who offers an employee a parking subsidy also must offer that employee the option to choose between the cash equivalent of that parking subsidy ...a cash ...

23

Provably  Secure  Online/Off-line  Identity-Based  Signature  Scheme  forWireless  Sensor  Network

Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network

... The signatures generated by the sensor nodes can be verified mutually by sensor nodes and by the base station. In WSN application o ff -line phase can be executed at the base station, while the online phase is to ...

15

DEMONETIZATION CONUNDRUM: A HARBINGER OF GROWTH OR THE OMINOUS SIGN OF LOOMING SLOWDOWN

DEMONETIZATION CONUNDRUM: A HARBINGER OF GROWTH OR THE OMINOUS SIGN OF LOOMING SLOWDOWN

... After 8/11/2016, a profound effect of demonization is observed in the large section of Indian society. The effects of demonetization have been widespread, sweeping over the economic, social and political arena. It caused ...

6

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card

... authentication scheme was proposed by Tsai et al. [13] in 2009. In this scheme, only one-way hash function and exclusive-or operations were used for mutual authentication and key agreement, so it reduced ...

25

Scalable  Divisible  E-cash

Scalable Divisible E-cash

... The protocol described above achieves the strongest level of anonymity where users cannot be identified as long as they remain honest. However, it may be necessary for legal reasons to allow some entity (e.g. the police) ...

19

ADAPTIVE NEURO-FUZZY BASED INFERENCE SYSTEM FOR LOAD FREQUENCY CONTROL OF HYDROTHERMAL SYSTEM UNDER DEREGULATED ENVIRONMENT

ADAPTIVE NEURO-FUZZY BASED INFERENCE SYSTEM FOR LOAD FREQUENCY CONTROL OF HYDROTHERMAL SYSTEM UNDER DEREGULATED ENVIRONMENT

... control scheme for AGC based on Adaptive Neuro-Fuzzy Inference System (ANFIS) under deregulated scenario has been ...proposed scheme has also been compared with another technique called as dual mode ...

10

Proposed secureSIP Authentication Scheme based on Elliptic Curve Cryptography

Proposed secureSIP Authentication Scheme based on Elliptic Curve Cryptography

... this scheme Is insecure; such as off-line password guessing attacks and impersonate other parties and ...their scheme is insecure against off-line password guessing and ...

6

Recognition of Isolated Handwritten Oriya Numerals using Hopfield Neural Network

Recognition of Isolated Handwritten Oriya Numerals using Hopfield Neural Network

... An approach for Bilingual (English - Oriya) script identification and recognition in a printed document is reported in [8]. In this work the authors have tried to distinguish between the English and Oriya documents ...

7

The Role of Project Finance in Contemporary Financing: “Theoretical Perspective”

The Role of Project Finance in Contemporary Financing: “Theoretical Perspective”

... Regardless of the revelations by coverage ratios, projects are subject to several financial threats over and above the ability of the project to generate stable and sufficient levels of cash flows especially ...

5

An Improvement of User Authentication Framework for Cloud Computing

An Improvement of User Authentication Framework for Cloud Computing

... If an adversary steals ’s smart card, then can extract security parameters } from legitimate user ’s smart card. However, this information does not help them. He/she cannot obtain any information of ’s and because these ...

9

SIMULATION OF MPC BASED SPEED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR 
DRIVE

SIMULATION OF MPC BASED SPEED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE

... authentication scheme is vulnerable to some attacks like off-line password guessing attacks, stolen- verifier attacks and denning-Sacco attacks , and also it does not provide perfect forward ...to ...

9

Rights in the pocket

Rights in the pocket

... Images, by which are meant still images, such as drawings, cartoons, photographs, but also graphics, symbols and trademarks, are also usually protected by copyright. For this material the same rule applies as for ...

37

Show all 10000 documents...

Related subjects