Results 61 to 70 of about 10,318 (256)

Tightly-Secure Simulation-Sound Quasi-Adaptive NIZK Arguments

open access: yesIEEE Access
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) arguments are fundamental cryptographic primitives widely used in privacy-preserving technologies such as anonymous credentials, group signatures, e-cash, and blockchain-based applications.
Mojtaba Khalili
doaj   +1 more source

Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis

open access: yesEarthquake Engineering &Structural Dynamics, EarlyView.
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman   +3 more
wiley   +1 more source

Pairings on Jacobians of Hyperelliptic Curves [PDF]

open access: yes, 2007
Consider the jacobian of a hyperelliptic genus two curve defined over a finite field. Under certain restrictions on the endomorphism ring of the jacobian we give an explicit description all non-degenerate, bilinear, anti-symmetric and Galois-invariant ...
Ravnshoj, Christian Robenhagen
core   +1 more source

Interaction of Dirac δ$$ \delta $$‐Waves in the Inviscid Levine and Sleeman Chemotaxis Model

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT This article investigates interactions of δ$$ \delta $$‐shock waves in the inviscid Levine and Sleeman chemotaxis model ut−λ(uv)x=0$$ {u}_t-\lambda {(uv)}_x=0 $$, vt−ux=0$$ {v}_t-{u}_x=0 $$. The analysis employs a distributional product and a solution concept that extends the classical solution concept.
Adelino Paiva
wiley   +1 more source

Cryptography in the Cloud Computing: the Current State and Logical Tasks

open access: yesБезопасность информационных технологий, 2013
The current state of the cloud computing (CC) information security is analysed and logical problems of storage and data transmission security at CC are allocated.
Sergey Nikolaevich Kyazhin   +1 more
doaj  

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

Algebras of Variable Coefficient Quantized Differential Operators

open access: yes, 2019
In the framework of (vector valued) quantized holomorphic functions defined on non-commutative spaces, ``quantized hermitian symmetric spaces'', we analyze what the algebras of quantized differential operators with variable coefficients should be.
Jakobsen, Hans Plesner
core  

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Asymptotics for the Spectrum of the Laplacian in Thin Bars with Varying Cross Sections

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We consider spectral problems for the Laplace operator in 3D rod structures with a small cross section of diameter O(ε)$$ O\left(\varepsilon \right) $$, ε$$ \varepsilon $$ being a positive parameter. The boundary conditions are Dirichlet (Neumann, respectively) on the bases of this structure, and Neumann on the lateral boundary.
Pablo Benavent‐Ocejo   +2 more
wiley   +1 more source

Threshold ring signature for wireless sensor networks

open access: yesTongxin xuebao, 2012
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the ...
Jun-fang XIAO, Jian LIAO, Gui-hua ZENG
doaj   +2 more sources

Home - About - Disclaimer - Privacy