Results 61 to 70 of about 1,995,067 (86)

Low-cost group-based identity security authentication protocol for NB-IoT nodes

open access: yesTongxin xuebao, 2021
To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem ...
Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
doaj   +2 more sources

The existence of affine-periodic solutions for nonlinear impulsive differential equations

open access: yesBoundary Value Problems, 2018
In this paper, we study the existence of affine-periodic solutions of nonlinear impulsive differential equations. The affine-periodic solutions have the form x(t+T)=Qx(t) $x(t+T)=Qx(t)$ with some nonsingular matrix Q.
Shuai Wang
doaj   +1 more source

Pohozhaev and Morawetz Identities in Elastostatics and Elastodynamics

open access: yesSymmetry, Integrability and Geometry: Methods and Applications, 2011
We construct identities of Pohozhaev type, in the context of elastostatics and elastodynamics, by using the Noetherian approach. As an application, a non-existence result for forced semi-linear isotropic and anisotropic elastic systems is established.
Yuri Bozhkov, Peter J. Olver
doaj   +1 more source

The Power of Predication and Quantification

open access: yesOpen Philosophy
In this article, I show how two modes of predication and quantification in a modal context allow one to (a) define what it is for an individual or relation to exist, (b) define identity conditions for properties and relations conceived hyperintensionally,
Zalta Edward N.
doaj   +1 more source

When the Identity Theorem “Seems” to Fail

open access: yesThe American mathematical monthly, 2014
J. Conejero   +3 more
semanticscholar   +1 more source

Existence and nonexistence of solutions for generalized quasilinear Kirchhoff–Schrödinger–Poisson system

open access: yesElectronic Journal of Qualitative Theory of Differential Equations
In this paper, we consider the existence and nonexistence of solutions for a class of modified Schrödinger–Poisson system with Kirchhoff-type perturbation by use of variational methods.
Yaru Wang, Jing Zhang
doaj   +1 more source

An Efficient Lightweight Authentication Scheme for Smart Meter

open access: yesMathematics
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security ...
Jingqi Du   +5 more
doaj   +1 more source
Some of the next articles are maybe not open access.

Related searches:

P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption

IEEE Transactions on Vehicular Technology, 2020
This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption (P2B) — a scheme to provide privacy preserving in identity-based broadcast proxy re-encryption.
Sumana Maiti, S. Misra
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy