Showing 1 - 6 results of 6 for search '"bulletin board"', query time: 0.05s Refine Results
  1. 1

    Security analysis and improvement of strongly secure certificate less signature scheme by Ai-wan FAN, Zhao-feng YANG, Li-ming XIE

    Published 2014-05-01
    “…Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. …”
    Get full text
    Article
  2. 2

    BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption by Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO

    Published 2022-09-01
    “…Current electronic voting systems mostly relied on central server and the trusted third party, this kind system architecture increases the security risks of voting, and even makes voting fail.In order to solve this issue, an electronic voting system BFV-blockchainvoting that supported BFV homomorphic encryption was proposed, and this system applied the blockchain technology to the electronic voting system to replace the trusted third party.Firstly, an open and transparent bulletin board was used to record the vote information, and an intelligent contract was used to realize the functions of verification and self counting.Secondly, in order to further improve the security and reliability of the voting process, the voter’s registration information was signed by SM2 signature algorithm, the ballot was managed by both parties that can supervise each other, and the counting data was encrypted by the BFV full homomorphic encryption algorithm.Finally, the evaluation of performance shows that it only costs 1.69 ms to complete one ballot in the proposed electronic voting system.This electronic voting scheme based on the BFV full homomorphic encryption and blockchain has better security attributes such as manipulation-resistance, anonymity, verifiability, double-voting resistance, coercion-resistance and resistance to quantum attacks.The scheme is suitable for a variety of voting scenarios and can meet the efficiency requirements in large voting scenarios.…”
    Get full text
    Article
  3. 3

    An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing by Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee

    Published 2021-01-01
    “…Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. …”
    Get full text
    Article
  4. 4

    Up against the System: A Case Study of Young Adult Perspectives Transitioning from Pediatric Palliative Care by Karen Cook, Harold Siden, Susan Jack, Lehana Thabane, Gina Browne

    Published 2013-01-01
    “…In a case study, using an innovative bulletin board focus group, we describe the complex interplay of the health, education, and social service sectors in this transition. …”
    Get full text
    Article
  5. 5

    Current Awareness Services and Information Dissemination in Universities -Western Uganda: A Case study of Ankole Western University. by Kanyamuhanga, Benjamin

    Published 2024
    “…The findings reveal a range of CAS types, including email alerts, bulletin boards, and social media platforms, as key tools for keeping users informed. …”
    Get full text
    Thesis
  6. 6

    A TEI Schema for the Representation of Computer-mediated Communication by Michael Beißwenger, Maria Ermakova, Alexander Geyken, Lothar Lemnitzer, Angelika Storrer

    Published 2012-10-01
    “…The focus of the schema is on those CMC genres which are written and dialogic―such as forums, bulletin boards, chats, instant messaging, wiki and weblog discussions, microblogging on Twitter, and conversation on “social network” sites. …”
    Get full text
    Article