Results 51 to 60 of about 30,832 (233)
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang +4 more
wiley +1 more source
Efficient and secure pairing-free certificateless directed signature scheme
In an ordinary signature scheme any one can verify the validity of a signature produced by the signer. But public verifiability of signatures is not desirable in some applications where the signed message is sensitive to the signature receiver, for ...
Gayathri Nemani Bhagya +3 more
doaj +1 more source
Invariant Measure and Universality of the 2D Yang–Mills Langevin Dynamic
ABSTRACT We prove that the Yang–Mills (YM) measure for the trivial principal bundle over the two‐dimensional torus, with any connected, compact structure group, is invariant for the associated renormalised Langevin dynamic. Our argument relies on a combination of regularity structures, lattice gauge‐fixing and Bourgain's method for invariant measures ...
Ilya Chevyrev, Hao Shen
wiley +1 more source
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj +1 more source
Symmetric bilinear forms and vertices in characteristic 2 [PDF]
Let $G$ be a finite group and let $k$ be an algebraically closed field of characteristic $2$ and let $M$ be an indecomposable $kG$-module which affords a non-degenerate $G$-invariant symmetric bilinear form.
Murray, John C.
core +1 more source
Mine‐water immersion tests reveal pronounced coal weakening (vs. minor concrete degradation), identifying coal pillars as the stability‐limiting component in composite dams. A coupled FEINN framework quantifies extreme‐pressure stability and ranks multi‐parameter designs via a normalized multi‐indicator scheme, enabling optimized dam configuration for ...
He Wen +6 more
wiley +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Threshold Password-Based Authentication Using Bilinear Pairings [PDF]
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not need to carry the smart card storing his private information.
Lee, S Lee, Sangwon +4 more
openaire +2 more sources
Solar Geoengineering Effects on Malaria Transmission Risk in South Asia Under G6sulfur Scenario
Comparison of EIR (unit: No of infected bites per person per day) for each considered country in South Asia, under the considered scenarios, averaged over the period 2020–2090. A regression equation is shown for each country (for Bhutan EIRG = 0.1690 × 10−10 EIRS + 0.5968 × 10−12) to illustrate the projected trend.
Athar Hussain +2 more
wiley +1 more source
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj +2 more sources

