14,601 Hits in 6.6 sec

Signature file hierarchies and signature graphs

Yangjun Chen, Yibin Chen
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
The main idea of this is a graph structure, called a signature graph, which is constructed over a signature file generated for a class and improves the search of a signature file dramatically.  ...  In addition, the signature files (accordingly, the signature graphs) can be organized into a hierarchy according to the nested structure (called the aggregation hierarchy) of classes in an object-oriented  ...  and m is the length of a signature.  ... 
doi:10.1145/967900.968050 dblp:conf/sac/ChenC04 fatcat:uucit7czvzgmlmzbinwxz3mhea

Short Attribute-Based Signatures for Threshold Predicates [chapter]

Javier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols
2012 Lecture Notes in Computer Science  
In the case of attribute-based signatures (ABS), users obtain from an authority their secret keys as a function of the attributes they hold, with which they can later sign messages for any predicate satisfied  ...  We propose the first two attribute-based signature schemes with constant size signatures.  ...  In this paper we propose the first attribute-based signature schemes which produce such short signatures, and which are proven secure in the selective-predicate setting (i.e., not fully secure), in the  ... 
doi:10.1007/978-3-642-27954-6_4 fatcat:yddyboy65fafpnboxuthgq7hou

Computational Genomic Signatures

Ozkan Ufuk Nalbantoglu, Khalid Sayood
2011 Synthesis Lectures on Biomedical Engineering  
Computer software and multimedia, when appropriate and available, is included for simulation, computation, visualization and design.  ...  Lectures in Biomedical Engineering will be comprised of 75-to 150-page publications on advanced and state-of-the-art topics that spans the field of biomedical engineering, from the atom and molecule to  ...  Computational Genomic Signatures Ozkan Ufuk Nalbantoglu and Khalid Sayood 2011 Acknowledgments This work was supported, in part, by a grant from the National Institutes of Health under grant K25AI068151  ... 
doi:10.2200/s00360ed1v01y201105bme041 fatcat:uuvesakjsfdavjgoqj672wwavm

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures [article]

Michael Specter, Sunoo Park, Matthew Green
2019 arXiv   pre-print
We formally define non-attributability, and present two practical system proposals -- KeyForge and TimeForge -- that provably achieve non-attributability while maintaining the important protection against  ...  Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences.  ...  Weitzner, John Hess, Bradley Sturt, and Stuart Babcock for their feedback. This work was supported in part by the William and Flora Hewlett Foundation grant 2014-1601.  ... 
arXiv:1904.06425v1 fatcat:fznsf63htnc6xb3poyrlj734zi

Time Signature Detection: A Survey

Jeremiah Abimbola, Daniel Kostrzewa, Pawel Kasprowski
2021 Sensors  
This paper presents a thorough review of methods used in various research articles published in the field of time signature estimation and detection from 2003 to the present.  ...  Results of the studies analyzed show that, in general, the process of time signature estimation is a difficult one.  ...  The annotations include duration of notes in fraction relative to a 1 4 th note (a crotchet), tempo curve, time signature, key signature (annotated as a relative major key), separate left and right-hand  ... 
doi:10.3390/s21196494 pmid:34640814 fatcat:xqjup7ox4nawphrfrcng23ugr4

Combining Pat-Trees and Signature Files for Query Evaluation in Document Databases [chapter]

Yangjun Chen, Karl Aberer
1999 Lecture Notes in Computer Science  
The key idea of the method is the combination of the technique of pat-trees with signature files.  ...  While the signature files are built to expedite the traversal of object hierarchies, the pat-trees are constructed to speed up both the signature file searching and the text scanning.  ...  What we want is to optimize these two processes by building indexes over both the object hierarchies and the texts stored as attribute values.  ... 
doi:10.1007/3-540-48309-8_44 fatcat:osbohatgzrgjdkjo3inlktfxr4

Comparison of metagenomic samples using sequence signatures

Bai Jiang, Kai Song, Jie Ren, Minghua Deng, Fengzhu Sun, Xuegong Zhang
2012 BMC Genomics  
Sequence-signature-based methods, however, do not need the complete genomes or existing databases and thus, can potentially be very useful for the comparison of metagenomic samples using NGS read data.  ...  The assembly of these reads can be difficult and analysis methods based on mapping reads to genes or pathways are also restricted by the availability and completeness of existing databases.  ...  In this study, we systematically investigated these key steps using a series of simulated and real metagenomic datasets, giving special attention to the choice of dissimilarity measures, the length of  ... 
doi:10.1186/1471-2164-13-730 pmid:23268604 pmcid:PMC3549735 fatcat:qzbelyytl5arbkjhgwga6p3bne

Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs [chapter]

Alwyn Goh, G. S. Poh, David C. L. Ngo
2003 Lecture Notes in Computer Science  
The resultant scheme can be operated in various configurations based on: (1) ratio of GM chain to WL star occurence, (2) frequency of one-time signature affixation, and (3) redundancy and spacing of signature-chain  ...  The proposed framework leverages the most attractive functional attributes of the constituent mechanisms ie: (1) immediate verifiability of onetime signatures and WL star nodes, (2) robust loss-tolerance  ...  The featured EGM protocol-in common with other one-time signature schemes ie Diffie-Lamport, Merkle and Merkle-Winternitz-has short Y = H key-lengths, but is particularly attractive in that the signature-lengths  ... 
doi:10.1007/978-3-540-45184-6_20 fatcat:uwdgwcxzknhj3buzhfqv6ebcbu

A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework

Jinhua Guo, John P. Baugh, Shengquan Wang
2007 2007 Mobile Networking for Vehicular Environments  
We propose a novel group signature based security framework for vehicular communications.  ...  Compared to the traditional digital signature scheme, the new scheme achieves authenticity, data integrity, anonymity, and accountability at the same time.  ...  ACKNOWLEDGMENTS This work is partially supported by NSF under the grant # CNS-0521142 and University of Michigan under an OVPR grant and a CEEP grant.  ... 
doi:10.1109/move.2007.4300813 fatcat:baepmhqsfjh6lh2l454ftzlxoq

The Repertoire of Mutational Signatures in Human Cancer [article]

Ludmil Alexandrov, Jaegil Kim, Nicholas J Haradhvala, Mi Ni Huang, Alvin W T Ng, Arnoud Boot, Kyle R Covington, Dmitry A Gordenin, Erik Bergstrom, Nuria Lopez-Bigas, Leszek J Klimczak, John R McPherson (+7 others)
2018 bioRxiv   pre-print
clustered base substitution, and 17 small insertion and deletion mutational signatures.  ...  Using 84,729,690 somatic mutations from 4,645 whole cancer genome and 19,184 exome sequences encompassing most cancer types we characterised 49 single base substitution, 11 doublet base substitution, four  ...  For each test, we generated two sets of "realistic" data: SP-realistic, based on 1091 SP's reference signatures and attributions, and SA-realistic, based on SA's reference 1092 signatures and attributions  ... 
doi:10.1101/322859 fatcat:mvr54gm2dndp5fhgqhgxbjtjde

Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice

Longbo Han, Suzhen Cao, Xiaodong Yang, Zhiqiang Zhang
2020 IEEE Access  
The new scheme has strong unforgeability for the difficult problem of Short Integer Solution (SIS) Question and a smaller signature size.  ...  Selecting the algorithm on the ideal lattice to generate the master key can effectively resist quantum attacks. The scheme gives a detailed security proof and efficiency analysis.  ...  First, based on previous work, we use the ideal lattice to improve the lattice-based ring signature to make it quantum-resistant and optimize the efficiency.  ... 
doi:10.1109/access.2020.3038042 fatcat:bh72urfcojatnee6wgsgfkiagu

Genome-Wide Signatures of 'Rearrangement Hotspots' within Segmental Duplications in Humans

Mohammed Uddin, Mitch Sturge, Lynette Peddle, Darren D. O'Rielly, Proton Rahman, Jeong-Sun Seo
2011 PLoS ONE  
A hierarchical method was employed to fragment segmental duplications (SDs) into multiple smaller SD units.  ...  The generation of genome-wide signatures of 'rearrangement hotspots', which likely serve as templates for NAHR, may provide a powerful approach towards understanding the underlying mutational mechanism  ...  Acknowledgments The authors wish to thank The Centre for Applied Genomics, The Hospital for Sick Children, Toronto, Ontario, Canada, for assistance with Cytogenomic services performed, and Peter Sudmant  ... 
doi:10.1371/journal.pone.0028853 pmid:22194928 pmcid:PMC3237539 fatcat:tup6bqb4ujcwpc7a4hsryx2qi4

Unconditionally Anonymous Ring and Mesh Signatures

Xavier Boyen
2015 Journal of Cryptology  
All that the signer needs to assemble such a virtual crowd is her own private key and the public keys of the other members. The crowd composition is all that the verifier will be able to see.  ...  We give an efficient linear-size construction based on bilinear maps in the common random string model.  ...  identity-based ring signatures of [42] , which add signer ambiguity to the notion of hierarchical identity-based signature.  ... 
doi:10.1007/s00145-015-9208-2 fatcat:nld3zjfcczf7zplgessklawjm4

Computational approaches for discovery of mutational signatures in cancer [article]

Adrian Baez-Ortega, Kevin Gori
2017 bioRxiv   pre-print
The study of these DNA fingerprints, termed mutational signatures, holds important potential for furthering our understanding of the causes and evolution of cancer, and can provide insights of relevance  ...  for cancer prevention and treatment.  ...  of length L.  ... 
doi:10.1101/154716 fatcat:fzcjbvq5nra7dbeh33u7lqxvma

Practical Implementation of Ring-SIS/LWE Based Signature and IBE [chapter]

Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt
2018 Lecture Notes in Computer Science  
Lattice-based signature and Identity-Based Encryption are well-known cryptographic schemes, and having both efficient and provable secure schemes in the standard model is still a challenging task in light  ...  We also describe and implement the underlying signature scheme, which is provably secure in the standard model and efficient.  ...  This work has received a French government support managed by the National Research Agency in the "Investing for the Future" program, under the national project RISQ P141580-2660001 / DOS0044216, and under  ... 
doi:10.1007/978-3-319-79063-3_13 fatcat:jmjrze2jqvf4fpnembomjb33ka
« Previous Showing results 1 — 15 out of 14,601 results