Results 101 to 110 of about 10,337 (237)
Improved certificateless sequential multi-signature scheme
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown ...
Hong-zhen DU, Qiao-yan WEN
doaj +2 more sources
Denoising Diffusion Model With Pixel‐Adaptive Convolutions for Sheet Metal Forming Analysis
ABSTRACT Traditional tool development processes in mechanical forming, especially for pressing tools, are often limited by time‐consuming trial‐and‐error cycles, which rely heavily on expert knowledge. These cycles can create bottlenecks and increase costs.
Syed Sarim Ali +3 more
wiley +1 more source
Distributed Optimization of Finite Condition Number for Laplacian Matrix in Multi‐Agent Systems
ABSTRACT This paper addresses the distributed optimization of the finite condition number of the Laplacian matrix in multi‐agent systems. The finite condition number, defined as the ratio of the largest to the second smallest eigenvalue of the Laplacian matrix, plays an important role in determining the convergence rate and performance of consensus ...
Yicheng Xu, Faryar Jabbari
wiley +1 more source
Hierarchical certificateless authenticated key agreement protocol
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj +2 more sources
Threshold Signature Schemes Application
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj
Abstract Atmosphere‐ocean‐land coupled forecasting systems, despite their comprehensiveness, face substantial challenges in the “predictability desert” at subseasonal to seasonal (S2S) timescales, particularly for precipitation—a variable crucial for socioeconomic activities yet of stunning spatiotemporal variance. Post‐processing methods developed for
Wen Shi +9 more
wiley +1 more source
ABSTRACT Global warming has intensified the atmospheric water cycle, leading to more frequent and severe extreme precipitation events, which are a major driver of rainstorm‐induced flooding. Developing regions such as the China–Pakistan economic corridor (CPEC), spanning highly heterogeneous terrain and climate zones, face elevated risk due to limited ...
Mengting Liu, Min Xu, Xingdong Li
wiley +1 more source
Abstract Urbanization can enhance local precipitation through thermodynamic and dynamic effects, yet detection of the urban rainfall island (URI) effect remains uncertain at the global scale because results vary across data sets, methods, and spatiotemporal resolutions.
Jinghua Xiong, Yuting Yang
wiley +1 more source
(Not Surprising) Attacks on Recent Pairing-Free Attribute-Based Encryption Schemes
The fact that designing secure and efficient identity or attribute-based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community.
Javier Herranz
doaj +1 more source
Interaction of Dirac δ$$ \delta $$‐Waves in the Inviscid Levine and Sleeman Chemotaxis Model
ABSTRACT This article investigates interactions of δ$$ \delta $$‐shock waves in the inviscid Levine and Sleeman chemotaxis model ut−λ(uv)x=0$$ {u}_t-\lambda {(uv)}_x=0 $$, vt−ux=0$$ {v}_t-{u}_x=0 $$. The analysis employs a distributional product and a solution concept that extends the classical solution concept.
Adelino Paiva
wiley +1 more source

