Research of STR multicast key management protocol based on bilinear pairing in ad hoc network
STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3 ...
ZHOU Fu-cai1 +3 more
doaj +2 more sources
On $5$-manifolds with free fundamental group and simple boundary links in $S^5$
We classify compact oriented $5$-manifolds with free fundamental group and $\pi_{2}$ a torsion free abelian group in terms of the second homotopy group considered as $\pi_1$-module, the cup product on the second cohomology of the universal covering, and ...
Kreck, Matthias, Su, Yang
core +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Practical Certificateless Aggregate Signatures From Bilinear Maps [PDF]
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage ...
Chen, Kefei +3 more
core +10 more sources
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal +2 more
core
MGDP: Mastering a Generalized Depth Perception Model for Quadruped Locomotion
ABSTRACT Perception‐based Deep Reinforcement Learning (DRL) controllers demonstrate impressive performance on challenging terrains. However, existing controllers still face core limitations, struggling to achieve both terrain generality and platform transferability, and are constrained by high computational overhead and sensitivity to sensor noise.
Yinzhao Dong +9 more
wiley +1 more source
Efficient method of constructing parameters in R-ate paring
In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed.
LI Bin, WANG Xin-mei
doaj +2 more sources
Quantization of anomaly coefficients in 6D $\mathcal{N}=(1,0)$ supergravity
We obtain new constraints on the anomaly coefficients of 6D $\mathcal{N}=(1,0)$ supergravity theories using local and global anomaly cancellation conditions.
Monnier, Samuel +2 more
core +2 more sources
Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren +6 more
wiley +1 more source
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj +1 more source

