Results 101 to 110 of about 10,337 (237)

Improved certificateless sequential multi-signature scheme

open access: yesTongxin xuebao, 2015
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

Denoising Diffusion Model With Pixel‐Adaptive Convolutions for Sheet Metal Forming Analysis

open access: yesProceedings in Applied Mathematics and Mechanics, Volume 26, Issue 2, June 2026.
ABSTRACT Traditional tool development processes in mechanical forming, especially for pressing tools, are often limited by time‐consuming trial‐and‐error cycles, which rely heavily on expert knowledge. These cycles can create bottlenecks and increase costs.
Syed Sarim Ali   +3 more
wiley   +1 more source

Distributed Optimization of Finite Condition Number for Laplacian Matrix in Multi‐Agent Systems

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 36, Issue 9, Page 5030-5043, June 2026.
ABSTRACT This paper addresses the distributed optimization of the finite condition number of the Laplacian matrix in multi‐agent systems. The finite condition number, defined as the ratio of the largest to the second smallest eigenvalue of the Laplacian matrix, plays an important role in determining the convergence rate and performance of consensus ...
Yicheng Xu, Faryar Jabbari
wiley   +1 more source

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj   +2 more sources

Threshold Signature Schemes Application

open access: yesБезопасность информационных технологий, 2015
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj  

Distribution‐Guided Ensemble Postprocessing for S2S Precipitation Forecasts: A Seamless Pathway Using Deep Generative Models

open access: yesJournal of Geophysical Research: Machine Learning and Computation, Volume 3, Issue 3, June 2026.
Abstract Atmosphere‐ocean‐land coupled forecasting systems, despite their comprehensiveness, face substantial challenges in the “predictability desert” at subseasonal to seasonal (S2S) timescales, particularly for precipitation—a variable crucial for socioeconomic activities yet of stunning spatiotemporal variance. Post‐processing methods developed for
Wen Shi   +9 more
wiley   +1 more source

Rainstorm Flood Risk Assessment in the China–Pakistan Economic Corridor Under Different Shared Socioeconomic Pathways of the 21st Century

open access: yesJournal of Flood Risk Management, Volume 19, Issue 2, June 2026.
ABSTRACT Global warming has intensified the atmospheric water cycle, leading to more frequent and severe extreme precipitation events, which are a major driver of rainstorm‐induced flooding. Developing regions such as the China–Pakistan economic corridor (CPEC), spanning highly heterogeneous terrain and climate zones, face elevated risk due to limited ...
Mengting Liu, Min Xu, Xingdong Li
wiley   +1 more source

Urban Rainfall Island Detection Remains Uncertain: A Global Sensitivity Analysis Across Data Sets and Methods

open access: yesGeophysical Research Letters, Volume 53, Issue 9, 16 May 2026.
Abstract Urbanization can enhance local precipitation through thermodynamic and dynamic effects, yet detection of the urban rainfall island (URI) effect remains uncertain at the global scale because results vary across data sets, methods, and spatiotemporal resolutions.
Jinghua Xiong, Yuting Yang
wiley   +1 more source

(Not Surprising) Attacks on Recent Pairing-Free Attribute-Based Encryption Schemes

open access: yesIET Information Security
The fact that designing secure and efficient identity or attribute-based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community.
Javier Herranz
doaj   +1 more source

Interaction of Dirac δ$$ \delta $$‐Waves in the Inviscid Levine and Sleeman Chemotaxis Model

open access: yesMathematical Methods in the Applied Sciences, Volume 49, Issue 7, Page 6492-6506, 15 May 2026.
ABSTRACT This article investigates interactions of δ$$ \delta $$‐shock waves in the inviscid Levine and Sleeman chemotaxis model ut−λ(uv)x=0$$ {u}_t-\lambda {(uv)}_x=0 $$, vt−ux=0$$ {v}_t-{u}_x=0 $$. The analysis employs a distributional product and a solution concept that extends the classical solution concept.
Adelino Paiva
wiley   +1 more source

Home - About - Disclaimer - Privacy