Results 11 to 20 of about 523,881 (183)

Efficient Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2012
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of ...
Sattar J, Mohammad AL-Fayoumi
openaire   +2 more sources

The Non--Ergodicity Threshold: Time Scale for Magnetic Reversal [PDF]

open access: yes, 2005
We prove the existence of a non-ergodicity threshold for an anisotropic classical Heisenberg model with all-to-all couplings. Below the threshold, the energy surface is disconnected in two components with positive and negative magnetizations respectively.
A. Dembo   +14 more
core   +1 more source

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Time-scale analysis of abrupt changes corrupted by multiplicative noise [PDF]

open access: yes, 2000
Multiplicative Abrupt Changes (ACs) have been considered in many applications. These applications include image processing (speckle) and random communication models (fading).
Castanié, Francis   +2 more
core   +2 more sources

Vortex Dynamics and Defects in Simulated Flux Flow [PDF]

open access: yes, 1996
We present the results of molecular dynamic simulations of a two-dimensional vortex array driven by a uniform current through random pinning centers at zero temperature. We identify two types of flow of the driven array near the depinning threshold.
A. A. Middleton   +37 more
core   +3 more sources

Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices

open access: yesCryptography, 2023
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme.
Anton Leevik   +2 more
doaj   +1 more source

Decoding sequential vs non-sequential two-photon double ionization of helium using nuclear recoil [PDF]

open access: yes, 2008
Above 54.4 eV, two-photon double ionization of helium is dominated by a sequential absorption process, producing characteristic behavior in the single and triple differential cross sections.
Horner, D. A.   +2 more
core   +2 more sources

Research Progress and Prospect of Ring Signatures [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
As a special group signature, ring signature has been widely used in anonymous voting, anonymous deposit and anonymous transaction because it can not only complete the signature without the cooperation of ring members, but also ensure the anonymity of ...
XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
doaj   +1 more source

Spectral and temporal signatures of ultrarelativistic protons in compact sources [PDF]

open access: yes, 2005
We present calculations of the spectral and temporal radiative signatures expected from ultrarelativistic protons in compact sources. The coupling between the protons and the leptonic component is assumed to occur via Bethe-Heitler pair production.
Kirk, J. G.   +2 more
core   +2 more sources

Direct Test of the Scalar-Vector Lorentz Structure of the Nucleon- and Antinucleon-Nucleus Potential [PDF]

open access: yes, 1999
Quantum Hadrodynamics in mean field approximation describes the effective nucleon-nucleus potential (about -50 MeV deep) as resulting from a strong repulsive vector (about 400 MeV) and a strong attractive scalar (about -450 MeV) contribution. This scalar-
Amand Faessler   +11 more
core   +2 more sources

Home - About - Disclaimer - Privacy