Results 81 to 90 of about 11,056,588 (189)

An Efficient Certificateless Anonymous Signcryption Scheme for WBAN

open access: yesSensors
A Wireless Body Area Network (WBAN), introduced into the healthcare sector to improve patient care and enhance the efficiency of medical services, also brings the risk of the leakage of patients’ privacy. Therefore, maintaining the communication security
Weifeng Long   +4 more
doaj   +1 more source

PRESYMMETRY BEYOND THE STANDARD MODEL [PDF]

open access: yesModern Physics Letters A, 2009
We go beyond the Standard Model guided by presymmetry, the discrete electroweak quark–lepton symmetry hidden by topological effects which explain quark fractional charges as in condensed matter physics. We show that partners of the particles of the Standard Model and the discrete symmetry associated with this partnership appear as manifestations of a ...
openaire   +3 more sources

The Lee-Wick Standard Model [PDF]

open access: yesCrossing the Boundaries, 2010
This article reviews some recent work on a version of the standard model (the Lee-Wick standard model) that contains higher derivative kinetic terms that improve the convergence of loop diagrams removing the quadratic divergence in the Higgs boson mass.
openaire   +3 more sources

Certificateless signature scheme without random oracles

open access: yesTongxin xuebao, 2015
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj  

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing

open access: yesIEEE Access, 2018
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability of testing the equivalence between two messages encrypted under different public keys.
Qiang Wang   +4 more
doaj   +1 more source

Practical NTRU Signcryption in the Standard Model. [PDF]

open access: yesEntropy (Basel), 2023
Yan J   +5 more
europepmc   +1 more source

Novel identity-based fully homomorphic encryption scheme from lattice

open access: yesTongxin xuebao, 2017
The previous identity-based homomorphic encryption schemes from lattice was analyzed.That the high complexity in previous schemes was mainly caused by trapdoor generation and preimage sampling was pointed out.A new solution was proposed.A novel identity ...
Yong-li TANG   +4 more
doaj  

On the noncommutative standard model

open access: yes, 2007
We propose a pedestrian review of the noncommutative standard model in its present state.Comment: dedicated to Alain Connes on the occasion of his 60th ...
Jureit, Jan-H.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy