نتایج جستجو برای: communicational factor

تعداد نتایج: 844794  

Journal: :IACR Cryptology ePrint Archive 2004
Fuw-Yi Yang Jinn-ke Jan

This paper proposes a new scheme for partially blind signature based on the difficulty in solving the discrete logarithm problem. Under the assumption of the generic model, random oracle model, and intractable ROS-problem, this paper formally proves that the proposed scheme is secure against one-more signature forgery under the adaptively parallel attack. Previous schemes using two signing equa...

2000
Steven Adler Jan Heise Matthias Mayer Peter Schefe

The Cyberspace Visualization Project – CVP – explores techniques for interactive 3D visualizations of the web, supporting orientation and basic communicational features1. Users can represent themselves within these visualizations and thus become aware of each other. This could be a base for a more direct communication on the web. Current software components are introduced and a placement algori...

2015
Plamenka Borovska Dragi Kimovski Atanas Hristov

Original scientific article High performance routers are fundamental building blocks of the system wide interconnection networks for high performance computing systems. Through collective interaction they provide reliable communication between the computing nodes and manage the communicational dataflow. The development process of specialized router architecture has high complexity and it requir...

2015
B. Sowmya

The Residue Number System (RNS) is a non-weighted system that is very efficient in digital signal processing and communicational applications. The previous proposed methods for the residue to binary (R/B) conversions are based on the Chinese Reminder Theorem (CRT) or Mixed Radix Conversion (MRC). These theorems are difficult to implement. In this paper, we present a new highspeed ROM-less resid...

2006
Jin Wook Byun Dong Hoon Lee Jongin Lim

We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two clients in different realms to agree on a common session key using different passwords. Byun et al. first presented C2C-PAKE schemes under the cross-realm setting. However, the schemes were not formally treated, and subsequently found to be flawed. In addition, in the schemes, there are still rooms for improve...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده کشاورزی 1392

در سال های اخیر، کاربرد مدل های هیدرولوژیکی توزیعی بر پایه فیزیکی افزایش یافته است. با این حال بسیاری از سوالات در خصوص واسنجی و صحت سنجی صحیح مدل های توزیعی و ارزیابی عدم قطعیت پارامترهای تخمینی، هنوز هم ناشناخته است. به خصوص برای مدل های پیچیده، تخمین پارامترها به طور صحیح، کاهش فضای پارامتری و استفاده از الگوریتم های موثر و کارآمد به منظور کاهش عدم قطعیت و تسهیل فرآیند واسنجی امری ضروریست. ه...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده کشاورزی زنجان 1393

در این تحقیق به بررسی پارامترهای بیلان آب حوضه رودخانه آق چای در شمال استان آذربایجان غربی، با مساحت 1440.89 کیلومتر مربع پرداخته شده است. مدل سازی بارش-رواناب با گام زمانی روزانه و با استفاده از مدل نیمه توزیعی swat و بهینه سازی پارامترهای حوضه، بررسی عدم قطعیت مدل و پارامترها با برنامه swat-cup انجام گرفته است. کاربرد الگوریتم sufi-2 در بررسی عدم قطعیت نشان داد مقدار ضریب ناش برای دوره واسنج...

2010
Md. Golam Kaosar Xun Yi

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...

2011
Oliver Damm Karoline Dreier Frank Hegel Petra Jaecks Prisca Stenneken Britta Wrede

The expectations of emotional displays play an important role in human-human and human-robot interaction in order to achieve a constructive interaction. However, as we argue in this position paper, current state-of-the-art social robotic models of emotion still neglect the communicational aspects of emotions. Based on different psychological models of emotion, we argue that an intra-personal ac...

2011
Esam A. A. Hagras Maha Amer Hazem H. Aly

In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید