نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

Journal: :IACR Cryptology ePrint Archive 2016
Pratish Datta Ratna Dutta Sourav Mukhopadhyay

Constrained pseudorandom functions (CPRF) are a fundamental extension of the notion of traditional pseudorandom functions (PRF). A CPRF enables a master PRF key holder to issue constrained keys corresponding to specific constraint predicates over the input domain. A constrained key can be used to evaluate the PRF only on those inputs which are accepted by the associated constraint predicate. Ho...

Journal: :CoRR 2012
Atsuko Miyaji Mohammad Shahriar Rahman

Radio-Frequency IDentification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radio waves. These RFID tags are heavily constrained in computational and storage capa...

Environmental concerns and depletion of nonrenewable resources has made great interest towards renewable energy resources. Cleanness and high potential are factors that caused fast growth of wind energy. However, the stochastic nature of wind energy makes the presence of energy storage systems (ESS) in wind integrated power systems, inevitable. Due to capability of being used in large-scale sys...

2012
Sebastian Unger Stefan Pfeiffer Dirk Timmermann

What visions of technologies such as the Internet of Things (IoT), Pervasive Computing (PC) or Ambient Intelligence (AI) have in common is that they employ a very high amount of critically resource-constrained devices. This of course raises a whole set of new security challenges. Instead of proposing another middleware for IoT, PC or AI, and presenting a security approach for it we focus on exi...

Journal: :CoRR 2009
Animesh Agarwal Vaibhav Shrimali Manik Lal Das

Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM support...

Journal: :international journal of industrial mathematics 2013
m. nikuie m. k. mirnia

in the linear system ax = b the points x are sometimes constrained to lie in a given subspace s of column space of a. drazin inverse for any singular or nonsingular matrix, exist and is unique. in this paper, the singular consistent or inconsistent constrained linear systems are introduced and the effect of drazin inverse in solving such systems is investigated. constrained linear system arise ...

2015

Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. L...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید