Results 41 to 50 of about 16,254,462 (314)

Finite Group Schemes Over Fields [PDF]

open access: yesProceedings of the American Mathematical Society, 1972
A short proof that commutative group schemes over a field form an abelian category is given.
Hoobler, Raymond T., Magid, Andy R.
openaire   +1 more source

The pseudo-fundamental group scheme [PDF]

open access: yesJournal of Algebra, 2019
Let $X$ be any scheme defined over a Dedekind scheme $S$ with a given section $x\in X(S)$. We prove the existence of a pro-finite $S$-group scheme $\aleph(X,x)$ and a universal $\aleph(X,x)$-torsor dominating all the pro-finite pointed torsors over $X$.
Antei, Marco, Dey, Arijit
openaire   +5 more sources

Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation

open access: yesCryptography, 2020
An efficient member revocation mechanism is a desirable feature when group signature schemes are applied in practical scenarios. Revocation methods, such as verifier-local revocation (VLR), provide an efficient member revocation in applications of group ...
Maharage Nisansala Sevwandi Perera   +1 more
doaj   +1 more source

How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes

open access: yesIET Information Security, 2021
Three closely related polynomial‐based group key pre‐distribution schemes have recently been proposed, aimed specifically at wireless sensor networks.
Chris J Mitchell
doaj   +1 more source

Constructions for infinitesimal group schemes [PDF]

open access: yesTransactions of the American Mathematical Society, 2011
55 pages. This is a final version to appear in Transactions of the AMS. Significantly revised from the original preprint.
Friedlander, Eric M., Pevtsova, Julia
openaire   +2 more sources

A Survey on Group Key Management Schemes

open access: yesCybernetics and Information Technologies, 2015
Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed
Seetha R., Saravanan R.
doaj   +1 more source

Hospital selection under Insured Public Health Schemes in the multi-criteria group decision-making environment

open access: yesProduction Engineering Archives, 2022
A thriving healthcare system perfectly reflects economic development and contentment amongst the people of any region. With increasing anxiety concering health and growing medical needs, hospitals worldwide face substantial challenge to provide patients ...
Dev Manimay, Kumar Dinesh, Mor Rahul S.
doaj   +1 more source

Quasi-linear analysis of dispersion relation preservation for nonlinear schemes

open access: yesAdvances in Aerodynamics, 2022
In numerical simulations of complex flows with discontinuities, it is necessary to use nonlinear schemes. The spectrum of the scheme used has a significant impact on the resolution and stability of the computation.
Fengyuan Xu   +3 more
doaj   +1 more source

Affine Grassmannians of group schemes and exotic principal bundles over ${\Bbb A}^1$ [PDF]

open access: yes, 2013
Let ${\bf G}$ be a simple simply-connected group scheme over a regular local scheme $U$. Let ${\mathcal E}$ be a principal ${\bf G}$-bundle over ${\Bbb A}^1_U$ trivial away from a subscheme finite over $U$.
R. Fedorov
semanticscholar   +1 more source

Brauer groups of Quot schemes [PDF]

open access: yesMichigan Mathematical Journal, 2015
Let $X$ be an irreducible smooth complex projective curve. Let ${\mathcal Q}(r,d)$ be the Quot scheme parametrizing all coherent subsheaves of ${\mathcal O}^{\oplus r}_X$ of rank $r$ and degree $-d$. There are natural morphisms ${\mathcal Q}(r,d) \longrightarrow \text{Sym}^d(X)$ and $\text{Sym}^d(X) \longrightarrow \text{Pic}^d(X)$.
Biswas, Indranil   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy