Results 1 to 10 of about 563,494 (247)
Localized radial solutions for a nonlinear p-Laplacian equation in $R^N$ [PDF]
We establish the existence of radial solutions to the p-Laplacian equation $ \Delta_p u + f(u)=0 $ in $\mathbb {R^N}$, where $f$ behaves like $|u|^{q-1}u$ when $u$ is large and $f(u) < 0$ for small positive $u$. We show that for each nonnegative integer
S. Pudipeddi
doaj +4 more sources
Study on Path Sweep Coverage Problem in Mobile Sensor Networks [PDF]
As an important application of wireless sensor networks, compared to traditional covering methods, a sweep coverage provides a more cost-efficient method for monitoring the Points of Interest (POIs) by placing the sensors regularly within the monitored ...
MIAO Xin, CHEN Xuan, BAO Hongying, ZHANG Jingxuan, YU Wei
doaj +1 more source
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model
In the forward secure sequential aggregate (FssAgg) signature scheme, the signer combines signatures generated in different intervals under different secret keys incrementally and sequentially in a layered “onion-like” fashion with the first signature ...
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj +1 more source
Forward Secure Sequential Aggregate Signature Schemes on Lattice
The forward secure sequential aggregate (Fss-Agg) signature has the advantages of forward secure signature and the sequential aggregate signature at the same time. Since its proposal in 2007, it has been widely applied in many application scenarios, such
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj +1 more source
GNSS Precise Relative Positioning Using A Priori Relative Position in a GNSS Harsh Environment
To enable Global Navigation Satellite System (GNSS)-based precise relative positioning, real-time kinematic (RTK) systems have been widely used.
Euiho Kim
doaj +1 more source
In bicycle sharing systems, many vehicles restore bicycles to ports. To construct the shortest tour of these vehicles, in a previous work, we formulated the multiple-vehicle bike sharing system routing problem (mBSSRP) and demonstrated that an optimal ...
Honami Tsushima +2 more
doaj +1 more source
Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice
With the development of the Vehicular Ad-Hoc Network (VANET), protecting user privacy while ensuring security has become an immense challenge. A ring signature has the characteristics of no manager and unconditional anonymity, which can substantially ...
Longbo Han +3 more
doaj +1 more source
Exact Closed-Form Solution for the Oscillator with a New Type of Mixed Nonlinear Restitution Force
This paper shows an oscillator with a spring made of material where the stress is a function not only of strain but also strain rate. The corresponding restitution force is of strong nonlinear monomial type and is the product of displacement and velocity
Livija Cveticanin
doaj +1 more source
Current proxy signature schemes are mostly identity-based proxy signatures that distinguish users by identity. This signature method faces some problems, such as identity information leakage and single access control. Attribute-based proxy signature (ABPS) divides the signer’s identity information into a collection of attributes; thus, users’ identity ...
Lulu Wei, Daofeng Li, Zhiqiang Liu
openaire +1 more source
Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures
The identity-based homomorphic signature (IBHS) enables an untrusted server to run some computation over the outsourced data and derive a short signature, vouching for the correctness of the output of the computation, while greatly simplifying key ...
Caifen Wang, Bin Wu, Hailong Yao
doaj +1 more source

