-
1
Identity and feminine life in the novel "A Secret in the Alleys"
Published 2024-10-01Subjects: “…a secret in the alleys…”
Get full text
Article -
2
Certificate integration management platform based on identity key
Published 2016-10-01Subjects: “…identity key…”
Get full text
Article -
3
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
4
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: “…secret sharing…”
Get full text
Article -
5
Assembly of the salt-secreting mangrove Avicennia rumphiana.
Published 2025-01-01“…Avicennia rumphiana, also known as Avicennia marina var. rumphiana or Avicennia lanata, is a mangrove species that has high salt tolerance and is one of the few species that secretes salt through the leaves, similar to Avicennia marina. …”
Get full text
Article -
6
THE LANGUAGE OF THE “SECRET SENSE”: ON THE LINGUISTIC STUDY OF PROPRIOCEPTION
Published 2024-12-01“…Starting from the classical definition of proprioception as a “secret sense” proposed by Ch. Sherrington, the author identifies the factors that impede its cognitive processing, verbalization and scientific analysis. …”
Get full text
Article -
7
Identity-based puncturable signature scheme
Published 2021-12-01“…To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.…”
Get full text
Article -
8
Adventurer in ranks of the secret services? To the biography of Pyotr Vasilyevich Glinko– Appin
Published 2022-12-01Get full text
Article -
9
Female Genital Mutilation/Cutting: The Secret World of Women as Seen by Men
Published 2013-01-01“…Although the practice is generally confined to the secret world of women, it does not mean that men cannot be influential. …”
Get full text
Article -
10
The links between the banned Lithuanian press and the national identity
Published 2024-08-01“…The publishing was concentrated in Lithuanian Minor (Prussia, Germany) and the USA and secretly disseminated among Lithuanians in the Russian Empire. …”
Get full text
Article -
11
Cystatin C Secretion in Blood Derivatives and Cellular Models of Idiopathic Parkinson’s Disease
Published 2025-01-01“…Secreted cystatin C concentration was measured in each biospecimen tested. …”
Get full text
Article -
12
Endothelial-secreted Endocan activates PDGFRA and regulates vascularity and spatial phenotype in glioblastoma
Published 2025-01-01“…Here we report that Endocan (ESM1), an endothelial-secreted proteoglycan, confers enhanced proliferative, migratory, and angiogenic properties to GBM cells and regulates their spatial identity. …”
Get full text
Article -
13
Light Regulates Secreted Metabolite Production and Antagonistic Activity in <i>Trichoderma</i>
Published 2024-12-01“…The 6-PP was purified, and its spectrum by nuclear magnetic resonance and mass spectroscopy was identical to that of commercial 6-PP. Light also induced or suppressed other unidentified metabolites in several other species of <i>Trichoderma</i>. …”
Get full text
Article -
14
On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
Published 2025-01-01“…The SKG procedure involves various steps such as wireless channel probing, quantization, information reconciliation, and privacy amplification to render effective symmetric secret key bits. This work proposes a novel multi-level channel quantization scheme, which for the given distribution of the channel envelopes’ gain, ensures an identical likelihood of the envelope samples falling into each quantization interval. …”
Get full text
Article -
15
Revocable identity-based proxy re-signature scheme in the standard model
Published 2019-05-01“…User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.…”
Get full text
Article -
16
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01“…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
Get full text
Article -
17
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01“…For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.…”
Get full text
Article -
18
Le paysage sonore comme révélateur de l’esprit du lieu : une sécrétion latente
Published 2018-12-01Get full text
Article -
19
Constructing Identities: Amos Tutuola and the Ibadan Literary Elite in the wake of Nigerian Independence
Published 2021-12-01“…Furthermore, educational experiences and sociocultural identities informed the ways in which independent Nigeria was envisioned by both Tutuola and the elite writers. …”
Get full text
Article -
20
Dynamic assignment and maintenance of positional identity in the ventral neural tube by the morphogen sonic hedgehog.
Published 2010-06-01“…Morphogens are secreted signalling molecules that act in a graded manner to control the pattern of cellular differentiation in developing tissues. …”
Get full text
Article