Results 61 to 70 of about 1,995,067 (86)
Low-cost group-based identity security authentication protocol for NB-IoT nodes
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj +2 more sources
The existence of affine-periodic solutions for nonlinear impulsive differential equations
In this paper, we study the existence of affine-periodic solutions of nonlinear impulsive differential equations. The affine-periodic solutions have the form x(t+T)=Qx(t) $x(t+T)=Qx(t)$ with some nonsingular matrix Q.
Shuai Wang
doaj +1 more source
Pohozhaev and Morawetz Identities in Elastostatics and Elastodynamics
We construct identities of Pohozhaev type, in the context of elastostatics and elastodynamics, by using the Noetherian approach. As an application, a non-existence result for forced semi-linear isotropic and anisotropic elastic systems is established.
Yuri Bozhkov, Peter J. Olver
doaj +1 more source
The Power of Predication and Quantification
In this article, I show how two modes of predication and quantification in a modal context allow one to (a) define what it is for an individual or relation to exist, (b) define identity conditions for properties and relations conceived hyperintensionally,
Zalta Edward N.
doaj +1 more source
When the Identity Theorem “Seems” to Fail
J. Conejero+3 more
semanticscholar +1 more source
In this paper, we consider the existence and nonexistence of solutions for a class of modified Schrödinger–Poisson system with Kirchhoff-type perturbation by use of variational methods.
Yaru Wang, Jing Zhang
doaj +1 more source
An Efficient Lightweight Authentication Scheme for Smart Meter
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security ...
Jingqi Du+5 more
doaj +1 more source
Euler’s Pentagonal Number Theorem and the Rogers-Fine Identity
G. Andrews, J. Bell
semanticscholar +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
IEEE Transactions on Vehicular Technology, 2020This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption (P2B) — a scheme to provide privacy preserving in identity-based broadcast proxy re-encryption.
Sumana Maiti, S. Misra
semanticscholar +1 more source