962 resultados para SCHEMES


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anomalous dynamics in complex systems have gained much interest in recent years. In this paper, a two-dimensional anomalous subdiffusion equation (2D-ASDE) is considered. Two numerical methods for solving the 2D-ASDE are presented. Their stability, convergence and solvability are discussed. A new multivariate extrapolation is introduced to improve the accuracy. Finally, numerical examples are given to demonstrate the effectiveness of the schemes and confirm the theoretical analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia seven schemes (apart from the Superannuation Complaints Tribunal) provide alternative dispute resolution services for complaints brought by consumers against financial services industry members. Recently the Supreme Court of New South Wales held that the decisions of one scheme were amenable to judicial review at the suit of a financial services provider member and the Supreme Court of Victoria has since taken a similar approach. This article examines the juristic basis for such a challenge and contends that judicial review is not available, either at common law or under statutory provisions. This is particularly the case since Financial Industry Complaints Service Ltd v Deakin Financial Services Pty Ltd (2006) 157 FCR 229; 60 ACSR 372 decided that the jurisdiction of a scheme is derived from a contract made with its members. The article goes on to contend that the schemes are required to give procedural fairness and that equitable remedies are available if that duty is breached.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.