Results 61 to 70 of about 30,753 (229)

Policy-based encryption schemes from bilinear pairings

open access: yesProceedings of the 2006 ACM Symposium on Information, computer and communications security, 2006
The concept of policy-based cryptography is a promising paradigm for trust establishment and authorization in largescale open environments like the Internet and Mobile Networks. It aims at providing a framework for performing cryptographic operations with respect to policies formalized as monotone Boolean expressions written in standard normal forms. A
Walid Bagga, Refik Molva, Stefano Crosta
openaire   +3 more sources

Intertwining operators and Hirota bilinear equations

open access: yes, 1995
An interpretation of Hirota bilinear relations for classical $\tau$ functions is given in terms of intertwining operators. Noncommutative example of $U_q(sl_2)$ is presented.Comment: Latex, 13 pages, no figures.
A. B. Zamolodchikov   +11 more
core   +1 more source

Interactions Between O‐Phospho‐L‐Serine and Trivalent Metal Ions: Studies in Solution and Solid State

open access: yesEuropean Journal of Inorganic Chemistry, EarlyView.
The interaction between the phosphorylated amino acid O‐phospho‐L‐serine and trivalent ions of f‐elements such as La3+, Eu3+, and Lu3+, supplemented by Y3+, has been studied in aqueous media. Nuclear magnetic resonance (NMR) spectroscopy in solution and in the solid state examined complex formation from the ligand perspective, while time‐resolved laser‐
Jonas Kunigkeit   +7 more
wiley   +1 more source

Efficient Certificateless Signcryption from Bilinear Pairings

open access: yesInternational Journal of Security and Its Applications, 2016
Certificateless public key cryptography is an attractive paradigm which combines advantages of both traditional certificate-based and ID-based public key cryptosystems. In this paper, the author formalizes the definition and the security model for certificateless signcryption (CLSC), and proposes a CLSC scheme that is proved to be secure in the random ...
openaire   +1 more source

Symmetries of WDVV equations

open access: yes, 2005
We say that a function F(tau) obeys WDVV equations, if for a given invertible symmetric matrix eta^{alpha beta} and all tau \in T \subset R^n, the expressions c^{alpha}_{beta gamma}(tau) = eta^{alpha lambda} c_{lambda beta gamma}(tau) = eta^{alpha lambda}
Albert Schwarz   +7 more
core   +1 more source

Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing

open access: yesElektronika ir Elektrotechnika, 2020
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj   +1 more source

Analytical Floor Response Spectra for Performance‐Based Seismic Design of Non‐structural Elements in Reinforced Concrete Frame Buildings

open access: yesEarthquake Engineering &Structural Dynamics, EarlyView.
ABSTRACT Damage to non‐structural elements significantly impacts the seismic performance of buildings in terms of economic and functionality losses. Consequently, performance‐based seismic design of non‐structural elements has become a key pillar of a comprehensive building‐seismic resilience strategy, for instance, through loss‐targeted earthquake ...
Roberto J. Merino   +2 more
wiley   +1 more source

Numerical Simulation of Post‐Yield Hysteretic Behavior of Lap‐Spliced Reinforced Concrete Bridge Pier Walls Under Earthquake Loading

open access: yesEarthquake Engineering &Structural Dynamics, EarlyView.
ABSTRACT Reinforced concrete pier walls designed before the 1970s often incorporate lap splice in potential plastic‐hinge regions. Previous experimental tests indicate that most of pier walls experienced post‐yield lap splice failure, necessitating a modeling approach that captures not only lap splice strength but also deformation capacity.
Gun Chan Lee   +2 more
wiley   +1 more source

Symmetric bilinear forms and vertices in characteristic 2 [PDF]

open access: yes, 2016
Let $G$ be a finite group and let $k$ be an algebraically closed field of characteristic $2$ and let $M$ be an indecomposable $kG$-module which affords a non-degenerate $G$-invariant symmetric bilinear form.
Murray, John C.
core   +1 more source

Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis

open access: yesEarthquake Engineering &Structural Dynamics, EarlyView.
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy