Results 41 to 50 of about 30,832 (233)

Research of STR multicast key management protocol based on bilinear pairing in ad hoc network

open access: yesTongxin xuebao, 2008
STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3 ...
ZHOU Fu-cai1   +3 more
doaj   +2 more sources

On $5$-manifolds with free fundamental group and simple boundary links in $S^5$

open access: yes, 2017
We classify compact oriented $5$-manifolds with free fundamental group and $\pi_{2}$ a torsion free abelian group in terms of the second homotopy group considered as $\pi_1$-module, the cup product on the second cohomology of the universal covering, and ...
Kreck, Matthias, Su, Yang
core   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Practical Certificateless Aggregate Signatures From Bilinear Maps [PDF]

open access: yes, 2008
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage ...
Chen, Kefei   +3 more
core   +10 more sources

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]

open access: yes, 2007
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal   +2 more
core  

MGDP: Mastering a Generalized Depth Perception Model for Quadruped Locomotion

open access: yesAdvanced Science, EarlyView.
ABSTRACT Perception‐based Deep Reinforcement Learning (DRL) controllers demonstrate impressive performance on challenging terrains. However, existing controllers still face core limitations, struggling to achieve both terrain generality and platform transferability, and are constrained by high computational overhead and sensitivity to sensor noise.
Yinzhao Dong   +9 more
wiley   +1 more source

Efficient method of constructing parameters in R-ate paring

open access: yesTongxin xuebao, 2010
In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed.
LI Bin, WANG Xin-mei
doaj   +2 more sources

Quantization of anomaly coefficients in 6D $\mathcal{N}=(1,0)$ supergravity

open access: yes, 2018
We obtain new constraints on the anomaly coefficients of 6D $\mathcal{N}=(1,0)$ supergravity theories using local and global anomaly cancellation conditions.
Monnier, Samuel   +2 more
core   +2 more sources

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT

open access: yesIEEE Access, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj   +1 more source

Home - About - Disclaimer - Privacy