نتایج جستجو برای: out scheme

تعداد نتایج: 1018417  

2012
Ting-Yi Chang Chou-Chen Yang Min-Shiang Hwang

A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. In this paper, we first separately point out that any adversary can forge a converted signature in Araki’s scheme and MaChen’s scheme. Moreover, we further improve the weakness in WuHsu’s scheme, which is to convert the signature into an ordin...

A. Hadidi Gh. Payganeh M. Hallaji N. Garjasi

Over the last ten years, robustness of schemes has raised an increasing interest among the CFD community. The objective of this article is to solve the quasi-one-dimensional compressible flow inside a “Shubin nozzle” and to investigate Bean-Warming and flux vector splitting methods for numerical solution of compressible flows. Two different conditions have been considered: first, there is a sup...

Journal: :I. J. Network Security 2015
Ying Wang Xinguang Peng

In 2011, Kumar et al. proposed an efficient password authentication scheme using smart cards to overcome the security flaws in Liao et al. scheme. However, in this paper, we point out that Kumar et al.’s scheme actually has various defects been overlooked, such as no provision of forward secrecy, poor repairability and practicality. More recently, Ramasamy and Muniyandi presented an efficient t...

Limb lengthening by Ilizarov lengthens not just the long bone, but also the soft tissues too. Damage of the musclesduring corticotomy and their stretching during distraction play a crucial role in occurrence of complications and finallimb function. We present here a systematic codified nomenclature system of each muscle summarising all theinfluence that corticotomy and distraction have the part...

Journal: :I. J. Network Security 2006
Zuhua Shao

To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDLP). The advantages of their scheme are low communication bandwidth and computational complexity, which provides critical benefits for the use of smart cards in distributed environments. Recently Wu et al. pointed out t...

1999
T. Kubota

The Pauli-Villars regularization scheme is often used for evaluating parton distributions within the framework of the chiral quark soliton model with inclusion of the vacuum polarization effects. Its simplest version with a single subtraction term should however be taken with some caution, since it does not fully get rid of divergences contained in scalar and psuedoscalar quark densities appear...

Journal: :international journal of nonlinear analysis and applications 2014
a. cheraghi

in a multi-secret sharing scheme, several secret values are distributed among a set of n participants.in 2000 chien et al.'s proposed a (t; n) multi-secret sharing scheme. many storages and publicvalues required in chien's scheme. motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the lagrange interpolation formula for polynomials andcip...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید