Showing 141 - 160 results of 2,564 for search 'mononym~', query time: 5.44s Refine Results
  1. 141

    ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN by Xiao-guang NIU, Chuan-bo WEI, Wei-jiang FENG, Guo-jun PENG, Huan-guo ZHANG

    Published 2015-06-01
    “…According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.…”
    Get full text
    Article
  2. 142
  3. 143
  4. 144

    Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC by Cai-fen WANG, Chao LIU, Ya-hong LI, Shu-fen NIU, Yu-lei ZHANG

    Published 2017-10-01
    “…Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode,the scheme ensured confidentiality and unforgeability on the basis of the assumption of computational Diffie-Hellman problem (CDHP),q-Diffie-Hellman inversion problem (q-DHIP) and bilinear Diffie-Hellman problem (BDHP).Simultaneously,the proposed scheme guaranteed unconnectedness and anonymity of the ciphertext.Compared with other heterogeneous schemes,the scheme achieved two-way signcryption,and it generated parameters without restrict,which was suitable for actual situations.Simulation tests show that proposed scheme is feasible.…”
    Get full text
    Article
  5. 145

    Security analysis of weighted network anonymity based on singular value decomposition by Yong ZENG, Lingjie ZHOU, Zhongyuan JIANG, Zhihong LIU, Jianfeng MA

    Published 2018-05-01
    “…The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.…”
    Get full text
    Article
  6. 146
  7. 147

    Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario by Hao WANG, Tianhao WU, Konglin ZHU, Lin ZHANG

    Published 2020-10-01
    “…With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and accept the regulation of LS.The basic of the security vehicle communication at intersections is authentication of network node.Based on this,an anonymous vehicle authentication scheme based on blockchain technology was proposed.The scheme employed a hybrid cryptography based on identity and hash message authentication code,and recorded the authentication results in blockchains.According to simulation testing and result analysis,the scheme ensures the anonymity and privacy-preserving,with less communication overhead compared to other methods.…”
    Get full text
    Article
  8. 148
  9. 149
  10. 150
  11. 151
  12. 152

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. The operations in our scheme only include a small number of communication phases and protect the identities of the entities involved (i.e. stakeholders and end-nodes) from any outside entity. …”
    Get full text
    Article
  13. 153
  14. 154

    Lightweight PUF-based anonymous authentication protocol in V2G by FAN Xinyue, LIU Jie, HE Jiahui

    Published 2024-10-01
    Subjects: “…anonymous authentication…”
    Get full text
    Article
  15. 155

    Olopatadine Suppresses the Migration of THP-1 Monocytes Induced by S100A12 Protein

    Published 2006-01-01
    “…Pretreatment of olopatadine with S100A12 reduced migration of THP-1, a monocyte cell line, induced by S100A12 alone, but did not affect recombinant human regulated upon activation, normal T cell expressed and secreted (RANTES)-induced migration. …”
    Get full text
    Article
  16. 156
  17. 157

    IFN-γ licenses normal and pathogenic ALPK1/TIFA pathway in human monocytes by Amandine Martin, Solène Caron, Mélissa Marcotte, Pauline Bronnec, Etienne Garneret, Nora Martel, Georgina Maalouf, Pascal Sève, David Saadoun, Yvan Jamilloux, Thomas Henry

    Published 2025-01-01
    “…Notably, IFN-γ is required to license the ALPK1/TIFA pathway in monocytes, while it was dispensable for the responsiveness of B cells. …”
    Get full text
    Article
  18. 158

    DNA Binding and Cleavage Activity of Binuclear Metal Complexes with Benzil-α-Monoxime Thiosemicarbzone by M. S. Surendra Babu, T. B. Patrudu, K. Hussain Reddy

    Published 2011-01-01
    “…Transition metal complexes of copper(II), nickel(II), cobalt(II) and iron(II) with benzil-α-monoxime thiosemicarbazone (BMOT) have been synthesized and characterized by molar conductance, magnetic moments, IR, electronic and ESR spectroscopy. …”
    Get full text
    Article
  19. 159

    Nucleotides Regulate Secretion of the Inflammatory Chemokine CCL2 from Human Macrophages and Monocytes by K. R. Higgins, W. Kovacevic, L. Stokes

    Published 2014-01-01
    “…The response to UTP in human monocytes was variable and required stimulation >6 hours. …”
    Get full text
    Article
  20. 160