scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Patent
26 Jun 2008
TL;DR: A proxy re-signature system as mentioned in this paper provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. This process is unidirectional, multi-use, private and non-interactive.
Abstract: A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described. Various combinations of the proxy re-signature process and the re-signature conversion process result in an overall process that is unidirectional, multi-use, private, and non-interactive. As such, the proxy re-signature system is applicable for use with a wide range of applications.

19 citations

Patent
18 May 2005

19 citations

ReportDOI
TL;DR: In this paper, the authors evaluate one necessary assumption: that people's preferences coincide with what they predict will maximize their subjective well-being (SWB) and find systematic reversals.
Abstract: Are subjective well-being (SWB) measures a good empirical proxy for utility? We evaluate one necessary assumption: that people’s preferences coincide with what they predict will maximize their SWB. Our method is to present survey respondents with hypothetical scenarios and elicit both choice and predicted SWB rankings of two alternatives. While choice and predicted SWB rankings usually coincide, we find systematic reversals. Furthermore, we identify factors—such as predicted sense of purpose, control over one‘s life, family happiness, and social status—that help explain choice controlling for predicted SWB. We explore how our findings vary with the SWB measure and the choice situation. JEL Classification: D03, D60

19 citations

Patent
03 Oct 2005
TL;DR: In this paper, a network proxy intercepts a client request for data and diverts the request to a remote server storing the primary copy of the data, rather than the data stored on the local server.
Abstract: A system of network proxies distributes data to multiple servers. Each network proxy is associated with a server. A network proxy intercepts a client request for data. If the network proxy determines that the request can be served using a copy of data stored on the local server, rather than the data stored on a remote server, it diverts the request to the local server. If the network proxy determines that the request cannot be served using a data from the local server, the network proxy diverts the request to a remote server storing the primary copy of the data. A server map specifies the locations of the primary copies of data. When a primary copy of data is updated on one of the servers, the associated network proxy propagates the updated data to the other servers. The servers can provide data from files, e-mail services, databases, or multimedia services.

19 citations

Proceedings ArticleDOI
21 Sep 2005
TL;DR: This paper gives the formal definition of multi-proxy signature schemes and formalize a notion of security for them and proposes a specific scheme which is provably secure in the new model.
Abstract: Multi-proxy signature schemes allow an original signer to authorize a group of proxy members, and only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Multi-proxy signature schemes have been suggested to use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Although some work has been done in multi-proxy signature schemes, until now there is no formalized definition and security model for them. In this paper, we give the formal definition of multi-proxy signature schemes and formalize a notion of security for them. We also propose a specific scheme which is provably secure in the new model.

19 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282