Results 61 to 70 of about 30,753 (229)
Policy-based encryption schemes from bilinear pairings
The concept of policy-based cryptography is a promising paradigm for trust establishment and authorization in largescale open environments like the Internet and Mobile Networks. It aims at providing a framework for performing cryptographic operations with respect to policies formalized as monotone Boolean expressions written in standard normal forms. A
Walid Bagga, Refik Molva, Stefano Crosta
openaire +3 more sources
Intertwining operators and Hirota bilinear equations
An interpretation of Hirota bilinear relations for classical $\tau$ functions is given in terms of intertwining operators. Noncommutative example of $U_q(sl_2)$ is presented.Comment: Latex, 13 pages, no figures.
A. B. Zamolodchikov +11 more
core +1 more source
The interaction between the phosphorylated amino acid O‐phospho‐L‐serine and trivalent ions of f‐elements such as La3+, Eu3+, and Lu3+, supplemented by Y3+, has been studied in aqueous media. Nuclear magnetic resonance (NMR) spectroscopy in solution and in the solid state examined complex formation from the ligand perspective, while time‐resolved laser‐
Jonas Kunigkeit +7 more
wiley +1 more source
Efficient Certificateless Signcryption from Bilinear Pairings
Certificateless public key cryptography is an attractive paradigm which combines advantages of both traditional certificate-based and ID-based public key cryptosystems. In this paper, the author formalizes the definition and the security model for certificateless signcryption (CLSC), and proposes a CLSC scheme that is proved to be secure in the random ...
openaire +1 more source
We say that a function F(tau) obeys WDVV equations, if for a given invertible symmetric matrix eta^{alpha beta} and all tau \in T \subset R^n, the expressions c^{alpha}_{beta gamma}(tau) = eta^{alpha lambda} c_{lambda beta gamma}(tau) = eta^{alpha lambda}
Albert Schwarz +7 more
core +1 more source
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj +1 more source
ABSTRACT Damage to non‐structural elements significantly impacts the seismic performance of buildings in terms of economic and functionality losses. Consequently, performance‐based seismic design of non‐structural elements has become a key pillar of a comprehensive building‐seismic resilience strategy, for instance, through loss‐targeted earthquake ...
Roberto J. Merino +2 more
wiley +1 more source
ABSTRACT Reinforced concrete pier walls designed before the 1970s often incorporate lap splice in potential plastic‐hinge regions. Previous experimental tests indicate that most of pier walls experienced post‐yield lap splice failure, necessitating a modeling approach that captures not only lap splice strength but also deformation capacity.
Gun Chan Lee +2 more
wiley +1 more source
Symmetric bilinear forms and vertices in characteristic 2 [PDF]
Let $G$ be a finite group and let $k$ be an algebraically closed field of characteristic $2$ and let $M$ be an indecomposable $kG$-module which affords a non-degenerate $G$-invariant symmetric bilinear form.
Murray, John C.
core +1 more source
Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman +3 more
wiley +1 more source

