scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Book ChapterDOI
12 Mar 2009
TL;DR: Wang et al. as mentioned in this paper proposed a proxy re-encryption scheme without pairings, in which the proxy can only transform the ciphertext in one direction, and the proposal is secure against chosen ciphertext attack (CCA) and collusion attack in the random oracle model based on Decisional Diffie-Hellman (DDH) assumption over the integer factorization assumption.
Abstract: In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using signature of knowledge and Fijisaki-Okamoto conversion, we propose a proxy re-encryption scheme without pairings, in which the proxy can only transform the ciphertext in one direction. The proposal is secure against chosen ciphertext attack (CCA) and collusion attack in the random oracle model based on Decisional Diffie-Hellman (DDH) assumption over $\mathbb{Z}_{N^2}^*$ and integer factorization assumption, respectively. To the best of our knowledge, it is the first unidirectional PRE scheme with CCA security and collusion-resistance.

220 citations

Patent
13 Sep 1996
TL;DR: In this paper, a proxy is used to monitor connection requests to any address on specific ports, and if either address is invalid, the proxy closes the connection and a new connection is setup such that both the requestor and server are transparently connected to the proxy with variable higher levels being connected in a relay mode.
Abstract: A proxy which is part of a firewall program controls exchanges of information between two application entities. The proxy interrogates attempts to establish a communication session by requesting entities with a server entity in lower layers in accordance with defined authentication procedures. The proxy interfaces with networking software to direct a communication stack to monitor connection requests to any address on specific ports. The requestor's address, and the server's address are checked against an access control list. If either address is invalid, the proxy closes the connection. If both are valid, a new connection is setup such that both the requestor and server are transparently connected to the proxy with variable higher levels being connected in a relay mode. Protocol data units are interrogated for conformance to a protocol session, and optionally further decoded to add additional application specific filtering. In one embodiment, an OSI architecture comprises the levels.

215 citations

Patent
12 Aug 2003
TL;DR: In this article, the authors propose a method and apparatus for a discovering proxy to transparently discover its position in a proxy pair by using proxy signals to indicate to other proxies that could pair with the discovering proxy.
Abstract: In a network supporting transactions between clients and servers and proxies that are interposable in a network path between at least one client and at least one server, wherein a pair of proxies can modify a packet stream between a client and a server such that packet data from the client to the server is transformed at a client-side proxy of the proxy pair and untransformed at a server-side proxy of proxy pair and such that packet data from the server to the client is transformed at the server-side proxy and untransformed at the client-side proxy, a method and apparatus for a discovering proxy to transparently discover its position in a proxy pair by using proxy signals to indicate to other proxies that could pair with the discovering proxy. A discovering proxy might determine that it is a client-side proxy by receipt of a packet from client without a proxy signal. A discovering proxy might determine that it is a server-side proxy by receipt of a packet from server without a return proxy signal. Once a proxy pair is discovered, that proxy pair might transform traffic from the server to the client or vice versa, transforming the traffic at one proxy of the proxy pair and untransforming the traffic at the other proxy of the pair.

213 citations

Journal ArticleDOI
TL;DR: In this paper, the authors compare several IOS proxy variables, including book-to-market measures, capital expenditure to assets ratios, and R&D intensity and E/P ratios, with subsequent realized growth and conclude that they may not be valid IOS proxies.
Abstract: Realized growth can be viewed as a proxy for the unobservable investment opportunity set (IOS) of the firm, and provides a benchmark against which IOS proxy variables can be compared. Results from such a comparison indicate that many of the variables from earlier studies, including book-to-market measures and capital expenditure to assets ratios are consistently correlated with subsequently realized growth. However, R&D intensity and E/P ratios do not exhibit any consistent association with subsequent growth indicating that they may not be valid IOS proxies.

213 citations

Journal ArticleDOI
TL;DR: In this paper, an achievement index is derived which accomodates the view that a further increase in the standard of living of a country when it is already at a higher level signifies an achievement greater than that of another with an equal increase but from a lower base.

213 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282