Learn More
Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong non-repudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be(More)
The UMTS/LTE protocol for mobile phone networks has been designed to offer a limited form of anonymity for mobile phone users. In this paper, we quantify precisely what this limited form of anonymity actually provides via a formal security model. The model considers an execution where the home and roaming network providers are considered as one entity. We(More)
We study the meter data management systems (MDMS) with a focus on missing data handling, and propose two approaches, called Lookback-N and Sandwich-N, based on the historical data. Using a realistic dataset, we demonstrate that Lookback-N is effective for online processing, and Sandwich-N outperforms the conventional offline approach, in terms of estimation(More)
Data analysis and accurate forecasts of electricity demand are crucial to help both suppliers and consumers understand their detailed electricity footprints and improve their awareness about their impacts to the ecosystem. Several studies of the subject have been conducted in recent years, but they are either comprehension-oriented without practical merits;(More)
BACKGROUND We tested the hypothesis that the apical myocardial mechanics differ from those of other ventricular segments in hypertensive patients with and without apical hypertrophic cardiomyopathy (ApHCM). METHODS We retrospectively studied hypertensive patients with and without ApHCM. Left ventricular longitudinal, circumferential, and radial strains(More)
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signature scheme is secure (in the random oracle model) if and only if the identification protocol is secure against passive impersonators. A similar results holds for constructing(More)