Showing 41 - 60 results of 74 for search 'secret identity', query time: 0.06s Refine Results
  1. 41

    Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity by Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG

    Published 2015-12-01
    “…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
    Get full text
    Article
  2. 42

    Sages comme des images ? Les héroïnes sensationnalistes et le monde de la mode by Laurence Talairach-Vielmas

    Published 2006-12-01
    “…In Mary Elizabeth Braddon’s Lady Audley’s Secret (1861-1862), the detective must learn to read pictures, from a Pre-Raphaelite portrait to books of beauties, so as to unveil the identity of the eponymous heroine, discovering in the process the way consumer society breeds female duplicity.…”
    Get full text
    Article
  3. 43

    Blind signature scheme based on trusted platform computation module by Wen-ting HUANG, Ling-ling TONG, Yong-jian WANG

    Published 2013-08-01
    “…For the key leak problem in identity-based blind signature, a blind signature scheme based on the trusted plat-form control module (TPCM) was presented. …”
    Get full text
    Article
  4. 44

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…It successfully recovers secret images at the receiver’s side using secret code series derived from both the secret and reference images, instead of direct transmission of secret image. …”
    Get full text
    Article
  5. 45

    Diabelskie koło historii. Poetyki miejskie w powieści Aleksieja Iwanowa Cienie Teutonów by Svetlana Pavlenko

    Published 2024-06-01
    “…It focuses on the urban landscapes of Baltiysk (Pillau) and Malbork (Marienburg), which exhibit a complex identity and strong interconnections at various levels of the narrative structure. …”
    Get full text
    Article
  6. 46

    ‘LONG-SUFFERING LANDS’ BETWEEN POLAND AND BELARUS. POLITICS OF STATE HISTORY IN BELARUS ABOUT SEPTEMBER 17TH, 1939, WORLD WAR II, AND BUILDING THE NATION by Florin ANGHEL

    Published 2024-12-01
    “…Furthermore, we would also like to cover some of the objectives of the national identity construction that the Minsk regime has ideologically built during the last three decades. …”
    Get full text
    Article
  7. 47

    Les musées amérindiens : des lieux de mémoire ou d’anti-mémoire ? by Gérard Selbach

    Published 2004-07-01
    “…The true spiritual memory cannot be exhibited: it is lived and practiced in secret. Museums are evidence of a secularized world that tends to lose the memory of the past and of the sacred. …”
    Get full text
    Article
  8. 48

    Coverless Steganography for Face Recognition Based on Diffusion Model by Yuan Guo, Ziqi Liu

    Published 2024-01-01
    “…Then, combined with conditional diffusion model and text key, a deterministic Denoising Diffusion Implicit Model (DDIM) is used to sample coverless steganography images. Secret images can also be recovered in high quality with DDIM Inversion technology. …”
    Get full text
    Article
  9. 49

    Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service by Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang

    Published 2019-04-01
    “…A shared key can be effectively traced, and if the traced identity claims that it is innocent, an auditor can publicly audit who will be responsible for the shared key. …”
    Get full text
    Article
  10. 50

    Character in Young Adult fiction: The example of Lyra in Philip Pullman’s His Dark Materials (1995-2000) and The Book of Dust (2017- ) by Virginie DOUGLAS

    Published 2024-06-01
    “…Even if His Dark Materials identified puberty as a turning-point in the young protagonists’ process of growing up and construction of identity, it is significant that Pullman, who had already added a small companion book—entitled Lyra’s Oxford—to the trilogy’s literary universe, is still trying to explore the multiple dimensions of Lyra’s constantly shifting character: while book 1 of The Book of Dust, Pullman’s new trilogy, La Belle Sauvage (2017), is a prequel to His Dark Materials, which focuses on Lyra as a baby—before the action in Northern Lights takes place—, book 2, The Secret Commonwealth (2019), takes a closer look at Lyra once she has become a young woman, after her meeting with Will in His Dark Materials.…”
    Get full text
    Article
  11. 51

    Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment by Shivangi Shukla, Sankita J. Patel

    Published 2021-05-01
    “…The biometric templates are never identical thereby, this approach allows fuzziness in minutiae points by incorporating Bose–Chaudhuri–Hocquenghem (BCH) codes for error‐correction and secures random codeword of the error‐correcting scheme as secret key by SHA‐256 hash mapping. …”
    Get full text
    Article
  12. 52

    Proven secure blind adaptor signature scheme based on the SM2 by HU Xiaoming, CHEN Haichan

    Published 2024-04-01
    “…Both the pre-signature and the formal signature are capable of extracting a secret value, which endows AS with atomicity and suggests its promising application within blockchain technologies. …”
    Get full text
    Article
  13. 53

    The Mustachioed Woman, or The Problem of Androgyny in Victoria Cross’ Six Chapters of a Man’s Life by Ana Raquel Rojas

    Published 2011-11-01
    “…The male narrator, Cecil, finds himself first attracted to and then frustrated by the ever-shifting gender identity of his female lover, Theodora, who secretly cross-dresses as a man, Theodore, so that they may travel together unmarried. …”
    Get full text
    Article
  14. 54

    The Fake History: Soviet Totalitarianism and the Memory of the Guerrilla War by Bernardas Gailius

    Published 2008-12-01
    “…There were also criminal cases initiated against Soviet secret agents and collaborators. However, these efforts did not help the tradition to evolve, as they were not accepted by society. …”
    Get full text
    Article
  15. 55

    ‘Queer Reverence’: Aubrey Beardsley’s Venus and Tannhäuser by Nicole Fluhr

    Published 2019-12-01
    “…It recasts the legendary Christian bard who tries and fails to renounce pagan pleasures as a sexually adventurous dandy; visiting the underground realm of the exiled goddess Venus, he finds it equal parts Alice in Wonderland and My Secret Life, peopled by decadent courtiers who feast, gamble, and gambol together. …”
    Get full text
    Article
  16. 56

    Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG

    Published 2022-10-01
    “…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
    Get full text
    Article
  17. 57

    « You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins by Laurence Taleirach-Vielmas

    Published 2008-12-01
    “…In The Woman in White, mysterious, secretive and dangerous characters abound, from the ghostly virgin dressed in white who wanders at night and threatens to reveal secrets, to the Italian count and the British baronet who incarcerate the heroine under her half-sister’s name in a lunatic asylum in order to inherit her fortune. …”
    Get full text
    Article
  18. 58

    Exploring the Diversity of Some Microorganisms from Lake Al-Asfar, KSA: The Good, the Bad, and the Pathogenic by Fatimah Al Tammar, Nermin El Semary, Munirah F. Aldayel, Duaa Althumairy, Gowhara Alfayad

    Published 2025-01-01
    “…The identity of the heterotrophic bacterial partners, on the other hand, awaits investigation and is addressed in the present research. …”
    Get full text
    Article
  19. 59

    The transcendent space of transformation by Antonio Ochoa

    Published 2010-04-01
    “…She sees this as a way to access the primary impulses and desires that secretly move our conscious behavior. The importance of ambiguity is the possibility of contact with different states or spaces of being. …”
    Get full text
    Article
  20. 60

    CFO-CR: Carrier Frequency Offset Methodology for High-Rate Common Randomness Generation by Prashanth Kumar Herooru Sheshagiri, Martin Reisslein, Juan A. Cabrera, Frank H. P. Fitzek

    Published 2025-01-01
    “…Ideally, the random variables at the two locations should be identical, i.e., have low probability of discrepancy, and should have high entropy. …”
    Get full text
    Article