Results 11 to 20 of about 11,016,214 (297)
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing
Public key encryption with equality test (PKE-ET) enables anyone to perform equivalence test between two messages encrypted under distinct public keys.
Jianfei Sun +3 more
doaj +1 more source
Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly.
Yuan Zhang +4 more
doaj +1 more source
Identity-based incremental signature scheme from lattices
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj
Highlights from the Compact Muon Solenoid (CMS) Experiment
The highlights of the recent activities and physics results leading up to the summer of 2018 from the Compact Muon Solenoid (CMS) experiment at the CERN Large Hadron Collider (LHC) are presented here.
Saranya Samik Ghosh +1 more
doaj +1 more source
This study was conducted to propose an optimal methodology for deriving a standard model from existing residential buildings. To strategically improve existing residential buildings, it is necessary to identify standard models that can be used as ...
Hye-Ryeong Nam +5 more
doaj +1 more source
Beyond the Cosmological Standard Model [PDF]
After a decade and a half of research motivated by the accelerating universe, theory and experiment have a reached a certain level of maturity. The development of theoretical models beyond \Lambda, or smooth dark energy, often called modified gravity ...
Jain, Bhuvnesh +3 more
core +1 more source
THE ROLE OF BEHAVIORAL ECONOMICS IN EXPLAINING CONSUMPTION DECISION [PDF]
The new economic approach starts from the idea that the individual does not need food, but feels the need to feed, or do not require newspapers, but feels the need of information.
Mihaela Andreea STROE
doaj
Wind Tunnel Testing of ONERA-M, AGARD-B and HB-2 Standard Models at Off-Design Conditions
Published results for standard wind tunnel models at non-standard test conditions are quite rare and/or may not be available. It has been found that those results are a useful aid in preparations for a number of wind tunnel tests in the Military ...
Dijana Damljanović +4 more
doaj +1 more source
Pressure of the standard model [PDF]
We review the computation of the thermodynamic pressure of the entire minimal standard model to three loop order, performed in hep-ph/0510375 and hep-ph/0512177.Comment: 4 pages, 3 figures, to appear in the proceedings of Strong and Electroweak Matter ...
A. Gynther +6 more
core +3 more sources
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong +4 more
doaj +1 more source

