Results 91 to 100 of about 10,337 (237)
Identity Based Generalized Signcryption Scheme in the Standard Model
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting.
Xiaoqin Shen, Yang Ming, Jie Feng
doaj +1 more source
Habitat fragmentation and climate change jointly threaten the persistence of wide‐ranging species, posing complex challenges for conservation planning. However, most current connectivity approaches overlook the integration of species‐specific constraints, climate‐driven dynamics, and quantitative robustness assessments. To bridge this gap, we propose a
Mengdi Fu +3 more
wiley +1 more source
Identity based authentication protocol for wireless sensor networks
In this work, a novel identity based authentication protocol for sensor networks is proposed, involving bilinear pairings over an elliptic curve point group, and message authentication codes, as main underlying components.
Moisés Salinas Rosales +1 more
doaj
An iterated greedy‐based metaheuristic with local search for the rank pricing problem
Abstract The rank pricing problem involves determining optimal prices for a set of products while accounting for customers' budgets and preferences. This study develops an iterated greedy‐based metaheuristic to efficiently solve this problem. The core idea is to generate a sequence of solutions by iteratively applying destruction and reconstruction ...
Herminia I. Calvete +3 more
wiley +1 more source
ABSTRACT We use banks’ quarterly fair value disclosures to perform the first short‐window event study of fair value adjustments excluded from net income and offer three main results. First, we find that fair value adjustments for banks’ loan portfolios are positively associated with short‐window stock returns and that they impact investors’ response to
John L. Campbell +2 more
wiley +1 more source
ABSTRACT Background Root torque control is essential for guiding the proper movement of anterior teeth, primarily to prevent periodontal complications. This movement, in clear aligner therapy (CAT), requires precise force application to minimize unintended displacements.
Flavio Traversa, Gabriele Rossini
wiley +1 more source
Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman +3 more
wiley +1 more source
ABSTRACT Purpose We present a method for absolute quantification of deuterated metabolites in vivo at 7T. We describe acquisition protocols and an analysis pipeline compatible with 7T Terra MRIs. We apply them using a 2H/1H receive array in healthy volunteers and glioblastoma patients.
Jabrane Karkouri +12 more
wiley +1 more source
Twisted Wire Strands Under Coupled Bending and Torsion
ABSTRACT Slender composite structures occur in automotive applications in different variations and on different size scales. They range from single conductors, which are composite structures themselves, to wiring harnesses, where another level of complexity is added by bundling several cables.
Muhannad Hawwash +5 more
wiley +1 more source
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj

