THRESHOLD SIGNATURE SCHEMES APPLICATION

Threshold Signature Schemes Application

This work is devoted to an investigation of threshold signature schemes.The systematization of the threshold signature schemes here was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined.Different methods of generation and verification of threshold signatures blackmores

read more

Biochemical conversion of waste paper slurries into bioethanol

Waste papers, which are a major constituent of municipal wastes, can be repurposed into the production of bioethanol, a renewable and ecofriendly fuel.Many studies have produced ethanol from print-grade papers, but literature on conversion of waste cartons is sparce.In this study, waste corrugated cartons and print-grade papers were reduced into sl

read more


Evaluation of two Taenia solium cysticercal antigenic preparations (vesicular fluid and a glycoprotein fraction with affinity for lentil lectin) for the immunodiagnosis of neurocysticercosis by enzyme-linked immunosorbent assay (ELISA)

OBJECTIVE: To evaluate the performance of two antigenic preparations (vesicular fluid - VF and a glycoprotein fraction, LLa-Gp fraction, purified from a whole parasite extract by lentil lectin affinity chromatography) from Taenia solium cysticerci for the immunodiagnosis of neurocysticercosis.METHOD: Fifty-six cerebrospinal fluid (CSF) samples (22

read more

An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques

Insider threats are malicious acts that can be carried out by an authorized employee within an organization.Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks.Most existing approaches in the field of in

read more