Results 41 to 50 of about 11,056,588 (189)

Physics Beyond the Standard Model [PDF]

open access: yes, 2006
I review recent theoretical work on electroweak symmetry breaking.Comment: 23 pages, 3 figures, talk at EPS International Europhysics Conference on High Energy Physics (HEP-EPS 2005), Lisbon, Portugal, 21-27 Jul ...
Rattazzi, R.
core   +2 more sources

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu   +3 more
doaj   +1 more source

Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model

open access: yesIEEE Access, 2020
Proxy signcryption is essential security primitive for emerging secure communication such as e-business, mobile agents, online voting, contract signing, and online auction.
Abdul Waheed   +7 more
doaj   +1 more source

Pressure of the standard model [PDF]

open access: yes, 2006
We review the computation of the thermodynamic pressure of the entire minimal standard model to three loop order, performed in hep-ph/0510375 and hep-ph/0512177.Comment: 4 pages, 3 figures, to appear in the proceedings of Strong and Electroweak Matter ...
A. Gynther   +6 more
core   +3 more sources

Beyond the Standard Model [PDF]

open access: yesInference: International Review of Science, 1989
Spontaneous symmetry breaking has led physicists to possible solutions that extend the Standard Model theory to include gravity and dark matter candidates.
openaire   +4 more sources

Development of methods and instruments of systemically important credit organizations regulation: world experience, Russian practice

open access: yesУченые записки Российской академии предпринимательства, 2021
In the article are offered the structure of SIFI regulation system, its principles, and described the standard model in accordance with which is necessary to develop the regulation system of systemically important credit organizations in Russia.
M. A. Zhurba
doaj  

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

A Note on Intended and Standard Models

open access: yesStudia Humana, 2020
This note discusses some problems concerning intended, standard, and nonstandard models of mathematical theories. We pay attention to the role of extremal axioms in attempts at a unique characterization of the intended models. We recall also Jan Woleński’
Pogonowski Jerzy
doaj   +1 more source

The Standard Model and Beyond [PDF]

open access: yes, 1998
Content 1. Why we do Believe in the Standard Model 2. Why we do not Believe in the Standard Model 2.1Conceptual Problems 2.2Hints from Experiment --2.2.1 Unification of Couplings --2.2.2 Dark Matter --2.2.3 Baryogenesis --2.2.4 Neutrino ...
Albuquerque   +61 more
core   +4 more sources

Contribution of Neutralino and Chargino to Diagonal Form Factor of Majorana Neutrino in the Minimal Supersymmetric Standard Model

open access: yesCumhuriyet Science Journal, 2023
In this study, we have calculated the diagonal form factor and charge radius of Majorana neutrinos in the Minimal Supersymmetry Standard Model (MSSM) using Feynman-'t Hooft gauge and dimensional regularization. From the obtained result of calculations,
Coşkun Aydın
doaj   +1 more source

Home - About - Disclaimer - Privacy