Vyzkoušejte nový nástroj s podporou AI
  
        
        Summon Research Assistant
        BETA
      
                    
  
      
    KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
                                      
                                            Yasin Kubilay, Murat,                              Sabir Kiraz, Mehmet,                              Ali Mantar, Haci                              
Published in Computer journal (01.04.2021)
                   
      
      
                                                  Published in Computer journal (01.04.2021)
Get full text
              Journal Article
          
              
          DiLizium: A Two-Party Lattice-Based Signature Scheme
                                      
                                            Vakarjuk, Jelizaveta,                              Snetkov, Nikita,                              Willemson, Jan                              
Published in Entropy (Basel, Switzerland) (30.07.2021)
                   
      
      
                                                  Published in Entropy (Basel, Switzerland) (30.07.2021)
Get full text
              Journal Article
          
              
          Validation of AclarusDx™, a blood-based transcriptomic signature for the diagnosis of Alzheimer's disease
                                      
                                            Fehlbaum-Beurdeley, Pascale,                              Sol, Olivier,                              Désiré, Laurent,                              Touchon, Jacques,                              Dantoine, Thierry,                              Vercelletto, Martine,                              Gabelle, Audrey,                              Jarrige, Anne-Charlotte,                              Haddad, Raphaël,                              Lemarié, Jean Christophe,                              Zhou, Weiyin,                              Hampel, Harald,                              Einstein, Richard,                              Vellas, Bruno                              
Published in Journal of Alzheimer's disease (01.01.2012)
                   
      
      
                                                  Published in Journal of Alzheimer's disease (01.01.2012)
Get more information
              Journal Article
          
              
          A Distributed Intelligent Service Trusted Provision Approach for IoT
                                      
                                            Qi, Yuanyuan,                              Shao, Sujie,                              Wu, Shuang,                              Qiu, Xuesong,                              Guo, Song,                              Guo, Shaoyong                              
Published in IEEE internet of things journal (15.12.2023)
                   
      
      
                                                  Published in IEEE internet of things journal (15.12.2023)
Get full text
              Journal Article
          
              
          Efficient and Adaptive Threshold Signatures for Ad hoc networks
                                      
                                            Di Pietro, Roberto,                              Mancini, Luigi Vincenzo,                              Zanin, Giorgio                              
Published in Electronic notes in theoretical computer science (14.04.2007)
                   
      
      
                                                  Published in Electronic notes in theoretical computer science (14.04.2007)
Get full text
              Journal Article
          
              
          Threshold Group Signature Scheme with Privilege Subjects Based on ECC
                                      
                                            Xueming Wang,                              Yurong Dong                              
Published in 2010 International Conference on Communications and Intelligence Information Security (01.10.2010)
                   
      
      
                                                  Published in 2010 International Conference on Communications and Intelligence Information Security (01.10.2010)
Get full text
              Conference Proceeding