Results 11 to 20 of about 11,016,214 (297)

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing

open access: yesIEEE Access, 2018
Public key encryption with equality test (PKE-ET) enables anyone to perform equivalence test between two messages encrypted under distinct public keys.
Jianfei Sun   +3 more
doaj   +1 more source

Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters

open access: yesEntropy, 2020
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly.
Yuan Zhang   +4 more
doaj   +1 more source

Identity-based incremental signature scheme from lattices

open access: yesTongxin xuebao, 2021
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj  

Highlights from the Compact Muon Solenoid (CMS) Experiment

open access: yesUniverse, 2019
The highlights of the recent activities and physics results leading up to the summer of 2018 from the Compact Muon Solenoid (CMS) experiment at the CERN Large Hadron Collider (LHC) are presented here.
Saranya Samik Ghosh   +1 more
doaj   +1 more source

Statistical Methodology for the Definition of Standard Model for Energy Analysis of Residential Buildings in Korea

open access: yesEnergies, 2020
This study was conducted to propose an optimal methodology for deriving a standard model from existing residential buildings. To strategically improve existing residential buildings, it is necessary to identify standard models that can be used as ...
Hye-Ryeong Nam   +5 more
doaj   +1 more source

Beyond the Cosmological Standard Model [PDF]

open access: yes, 2014
After a decade and a half of research motivated by the accelerating universe, theory and experiment have a reached a certain level of maturity. The development of theoretical models beyond \Lambda, or smooth dark energy, often called modified gravity ...
Jain, Bhuvnesh   +3 more
core   +1 more source

THE ROLE OF BEHAVIORAL ECONOMICS IN EXPLAINING CONSUMPTION DECISION [PDF]

open access: yesChallenges of the Knowledge Society, 2015
The new economic approach starts from the idea that the individual does not need food, but feels the need to feed, or do not require newspapers, but feels the need of information.
Mihaela Andreea STROE
doaj  

Wind Tunnel Testing of ONERA-M, AGARD-B and HB-2 Standard Models at Off-Design Conditions

open access: yesAerospace, 2021
Published results for standard wind tunnel models at non-standard test conditions are quite rare and/or may not be available. It has been found that those results are a useful aid in preparations for a number of wind tunnel tests in the Military ...
Dijana Damljanović   +4 more
doaj   +1 more source

Pressure of the standard model [PDF]

open access: yes, 2006
We review the computation of the thermodynamic pressure of the entire minimal standard model to three loop order, performed in hep-ph/0510375 and hep-ph/0512177.Comment: 4 pages, 3 figures, to appear in the proceedings of Strong and Electroweak Matter ...
A. Gynther   +6 more
core   +3 more sources

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

open access: yesIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy