Results 61 to 70 of about 10,318 (256)
Tightly-Secure Simulation-Sound Quasi-Adaptive NIZK Arguments
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) arguments are fundamental cryptographic primitives widely used in privacy-preserving technologies such as anonymous credentials, group signatures, e-cash, and blockchain-based applications.
Mojtaba Khalili
doaj +1 more source
Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman +3 more
wiley +1 more source
Pairings on Jacobians of Hyperelliptic Curves [PDF]
Consider the jacobian of a hyperelliptic genus two curve defined over a finite field. Under certain restrictions on the endomorphism ring of the jacobian we give an explicit description all non-degenerate, bilinear, anti-symmetric and Galois-invariant ...
Ravnshoj, Christian Robenhagen
core +1 more source
Interaction of Dirac δ$$ \delta $$‐Waves in the Inviscid Levine and Sleeman Chemotaxis Model
ABSTRACT This article investigates interactions of δ$$ \delta $$‐shock waves in the inviscid Levine and Sleeman chemotaxis model ut−λ(uv)x=0$$ {u}_t-\lambda {(uv)}_x=0 $$, vt−ux=0$$ {v}_t-{u}_x=0 $$. The analysis employs a distributional product and a solution concept that extends the classical solution concept.
Adelino Paiva
wiley +1 more source
Cryptography in the Cloud Computing: the Current State and Logical Tasks
The current state of the cloud computing (CC) information security is analysed and logical problems of storage and data transmission security at CC are allocated.
Sergey Nikolaevich Kyazhin +1 more
doaj
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin +4 more
doaj +1 more source
Algebras of Variable Coefficient Quantized Differential Operators
In the framework of (vector valued) quantized holomorphic functions defined on non-commutative spaces, ``quantized hermitian symmetric spaces'', we analyze what the algebras of quantized differential operators with variable coefficients should be.
Jakobsen, Hans Plesner
core
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Asymptotics for the Spectrum of the Laplacian in Thin Bars with Varying Cross Sections
ABSTRACT We consider spectral problems for the Laplace operator in 3D rod structures with a small cross section of diameter O(ε)$$ O\left(\varepsilon \right) $$, ε$$ \varepsilon $$ being a positive parameter. The boundary conditions are Dirichlet (Neumann, respectively) on the bases of this structure, and Neumann on the lateral boundary.
Pablo Benavent‐Ocejo +2 more
wiley +1 more source
Threshold ring signature for wireless sensor networks
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the ...
Jun-fang XIAO, Jian LIAO, Gui-hua ZENG
doaj +2 more sources

