Showing 1 - 20 results of 478 for search 'Uproxx~', query time: 4.48s Refine Results
  1. 1

    Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes by Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal

    Published 2021-01-01
    “…Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. …”
    Get full text
    Article
  2. 2
  3. 3

    Accumulation of Deficits as a Proxy Measure of Aging by Arnold B. Mitnitski, Alexander J. Mogilner, Kenneth Rockwood

    Published 2001-01-01
    “…In consequence, we propose that it may be used as a proxy measure of aging.…”
    Get full text
    Article
  4. 4

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. …”
    Get full text
    Article
  5. 5

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. …”
    Get full text
    Article
  6. 6
  7. 7

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…Ciphertext-Policy Attribute-Based Proxy Reencryption (CP-ABPRE) has found many practical applications in the real world, because it extends the traditional Proxy Reencryption (PRE) and allows a semitrusted proxy to transform a ciphertext under an access policy to the one with the same plaintext under another access policy. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) by Celina Gomez, Russell F. Mizell, III

    Published 2009-04-01
    “…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
    Get full text
    Article
  11. 11

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organizations. Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
    Get full text
    Article
  12. 12

    Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) by Celina Gomez, Russell F. Mizell, III

    Published 2009-04-01
    “…EENY 432/IN795: Black Stink Bug Proxys punctulatus (Palisot) (Insecta: Hemiptera: Pentatomidae) (ufl.edu) …”
    Get full text
    Article
  13. 13
  14. 14

    Awareness and Perception of Healthcare Providers about Proxy Consent in Critical Care Research by Rania Mahafzah, Karem H. Alzoubi, Omar F. Khabour, Rana Abu-Farha

    Published 2021-01-01
    “…Objective. Proxy consent respects patients’ autonomy when they are incapable of providing consent for research participation. …”
    Get full text
    Article
  15. 15

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    V-Prox-Regular Functions in Smooth Banach Spaces by Messaoud Bounkhel, Mostafa Bachar

    Published 2020-01-01
    “…In this paper, we continue the study of the V-prox-regularity that we have started recently for sets. …”
    Get full text
    Article
  20. 20

    Data quality in centenarian research: The proxy-centenarian relationship and item nonresponse in the SWISS100 study. by Daniele Zaccaria, Justine Falciola, Barbara Masotti, Armin von Gunten, François Herrmann, Daniela S Jopp, Stefano Cavalli

    Published 2025-01-01
    “…There was a low prevalence of item nonresponse among proxy respondents. Proxy type significantly impacted item nonresponse, particularly with non-relatives showing notably higher unanswered question rates. …”
    Get full text
    Article