-
141
ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN
Published 2015-06-01“…According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.…”
Get full text
Article -
142
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01Subjects: Get full text
Article -
143
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: Get full text
Article -
144
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2017-10-01“…Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode,the scheme ensured confidentiality and unforgeability on the basis of the assumption of computational Diffie-Hellman problem (CDHP),q-Diffie-Hellman inversion problem (q-DHIP) and bilinear Diffie-Hellman problem (BDHP).Simultaneously,the proposed scheme guaranteed unconnectedness and anonymity of the ciphertext.Compared with other heterogeneous schemes,the scheme achieved two-way signcryption,and it generated parameters without restrict,which was suitable for actual situations.Simulation tests show that proposed scheme is feasible.…”
Get full text
Article -
145
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01“…The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.…”
Get full text
Article -
146
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
147
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01“…With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and accept the regulation of LS.The basic of the security vehicle communication at intersections is authentication of network node.Based on this,an anonymous vehicle authentication scheme based on blockchain technology was proposed.The scheme employed a hybrid cryptography based on identity and hash message authentication code,and recorded the authentication results in blockchains.According to simulation testing and result analysis,the scheme ensures the anonymity and privacy-preserving,with less communication overhead compared to other methods.…”
Get full text
Article -
148
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
149
Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks
Published 2009-01-01Get full text
Article -
150
Alcoholics Anonymous Comes to Poland: The Founding of the Polish AA and the American Connection
Published 2019-01-01Subjects: Get full text
Article -
151
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2020-04-01Subjects: Get full text
Article -
152
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. The operations in our scheme only include a small number of communication phases and protect the identities of the entities involved (i.e. stakeholders and end-nodes) from any outside entity. …”
Get full text
Article -
153
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: Get full text
Article -
154
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: “…anonymous authentication…”
Get full text
Article -
155
Olopatadine Suppresses the Migration of THP-1 Monocytes Induced by S100A12 Protein
Published 2006-01-01“…Pretreatment of olopatadine with S100A12 reduced migration of THP-1, a monocyte cell line, induced by S100A12 alone, but did not affect recombinant human regulated upon activation, normal T cell expressed and secreted (RANTES)-induced migration. …”
Get full text
Article -
156
Apigenin inhibits NLRP3 inflammasome activation in monocytes and macrophages independently of CD38
Published 2025-01-01Subjects: Get full text
Article -
157
IFN-γ licenses normal and pathogenic ALPK1/TIFA pathway in human monocytes
Published 2025-01-01“…Notably, IFN-γ is required to license the ALPK1/TIFA pathway in monocytes, while it was dispensable for the responsiveness of B cells. …”
Get full text
Article -
158
DNA Binding and Cleavage Activity of Binuclear Metal Complexes with Benzil-α-Monoxime Thiosemicarbzone
Published 2011-01-01“…Transition metal complexes of copper(II), nickel(II), cobalt(II) and iron(II) with benzil-α-monoxime thiosemicarbazone (BMOT) have been synthesized and characterized by molar conductance, magnetic moments, IR, electronic and ESR spectroscopy. …”
Get full text
Article -
159
Nucleotides Regulate Secretion of the Inflammatory Chemokine CCL2 from Human Macrophages and Monocytes
Published 2014-01-01“…The response to UTP in human monocytes was variable and required stimulation >6 hours. …”
Get full text
Article -
160
Monocyte and Macrophage in Follicular Liquid: Predictive Markers of Embryo Quality in Women with Obesity and Infertility
Published 2025-01-01Subjects: Get full text
Article