Results 51 to 60 of about 10,318 (256)
Invariant Measure and Universality of the 2D Yang–Mills Langevin Dynamic
ABSTRACT We prove that the Yang–Mills (YM) measure for the trivial principal bundle over the two‐dimensional torus, with any connected, compact structure group, is invariant for the associated renormalised Langevin dynamic. Our argument relies on a combination of regularity structures, lattice gauge‐fixing and Bourgain's method for invariant measures ...
Ilya Chevyrev, Hao Shen
wiley +1 more source
Policy-based encryption schemes from bilinear pairings
The concept of policy-based cryptography is a promising paradigm for trust establishment and authorization in largescale open environments like the Internet and Mobile Networks. It aims at providing a framework for performing cryptographic operations with respect to policies formalized as monotone Boolean expressions written in standard normal forms. A
Walid Bagga, Refik Molva, Stefano Crosta
openaire +3 more sources
Two secure non-symmetric role Key-Agreement protocols [PDF]
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H. +3 more
core
The interaction between the phosphorylated amino acid O‐phospho‐L‐serine and trivalent ions of f‐elements such as La3+, Eu3+, and Lu3+, supplemented by Y3+, has been studied in aqueous media. Nuclear magnetic resonance (NMR) spectroscopy in solution and in the solid state examined complex formation from the ligand perspective, while time‐resolved laser‐
Jonas Kunigkeit +7 more
wiley +1 more source
Optimistic Mix-net protocol based on bilinear pairings
A novel pairing-based optimistic Mix-net scheme was proposed. The key management is made easier by em-ploying bilinear paring primitives and there is no need for the participating mix servers to re-generate keys jointly be-tween mix-sessions to avoid ...
Long-hai LI, Shao-feng FU, Rui-dan SU
doaj
Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI) or identity-based cryptosystem (IBC) have been proposed in the literature; however, no certificateless short sequential (or serial ...
SK Hafizul Islam, G.P. Biswas
doaj +1 more source
Efficient Certificateless Signcryption from Bilinear Pairings
Certificateless public key cryptography is an attractive paradigm which combines advantages of both traditional certificate-based and ID-based public key cryptosystems. In this paper, the author formalizes the definition and the security model for certificateless signcryption (CLSC), and proposes a CLSC scheme that is proved to be secure in the random ...
openaire +1 more source
ABSTRACT Damage to non‐structural elements significantly impacts the seismic performance of buildings in terms of economic and functionality losses. Consequently, performance‐based seismic design of non‐structural elements has become a key pillar of a comprehensive building‐seismic resilience strategy, for instance, through loss‐targeted earthquake ...
Roberto J. Merino +2 more
wiley +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
ABSTRACT Reinforced concrete pier walls designed before the 1970s often incorporate lap splice in potential plastic‐hinge regions. Previous experimental tests indicate that most of pier walls experienced post‐yield lap splice failure, necessitating a modeling approach that captures not only lap splice strength but also deformation capacity.
Gun Chan Lee +2 more
wiley +1 more source

