نتایج جستجو برای: distributed generation

تعداد نتایج: 606885  

Journal: :I. J. Network Security 2013
Blazej Brzezniak Lucjan Hanzlik Przemyslaw Kubiak Miroslaw Kutylowski

Distributed RSA key generation protocols aim to generate RSA keys in such a way that no single participant of the protocol can learn factorization of the RSA modulus. In this note we show that two recent protocols of this kind (Journal of Network Security, Vol. 7, No. 1, 2008, pp. 106-113 and Vol. 8, No. 2, 2009, pp. 139-150) fail their security target. We present an attack that can be launched...

2013
David Bernhard Stephan Neumann Melanie Volkamer

Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General-purpose verifiable mixnets however suffer from the drawback that the amount of data to be verified by observers increases linearly with the number of involved mix nodes, the number of decryptors, and the number of voters. Chase et al. proposed a verifiable mixnet at Eurocrypt 2012 based on so-ca...

2008
Adam M. Davis Dmitri Chmelev Michael R. Clarkson

This paper describes the implementation of a threshold cryptosystem for Civitas, a secure electronic voting system. The cryptosystem improves the availability of Civitas by enabling tabulation to complete despite the failure of some agents. The implementation includes a sophisticated distributed key generation protocol, which was designed by Gennaro, Jarecki, Krawczyk, and Rabin. The cryptosyst...

Journal: :Journal of the Air & Waste Management Association 2011
Satish Vutukuru Marc Carreras-Sospedra Jacob Brouwer Donald Dabdub

Distributed power generation-electricity generation that is produced by many small stationary power generators distributed throughout an urban air basin-has the potential to supply a significant portion of electricity in future years. As a result, distributed generation may lead to increased pollutant emissions within an urban air basin, which could adversely affect air quality. However, the us...

2004
Radha Poovendran Brian Matt

Poovendran, Corson and Baras presented a distributed cryptographic key generation algorithm that was suitable for wireless networking environment. However, the security as well as the computational complexity of their scheme were never analyzed. In this work, we present information theoretic analysis of their work and derive the properties of the cryptographic keys that are generated by their s...

1999
Ran Canetti Rosario Gennaro Stanislaw Jarecki Hugo Krawczyk Tal Rabin

We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for corruption at any time during the run of the protocol. In contrast, all previously known efficient protocols for these problems were proven secure only against less realistic static adversaries that c...

The operation of a distribution system in the presence of distributed generation systems has someadvantages and challenges. Optimal sizing and siting of DG systems has economic, technical, andenvironmental benefits in distribution systems. Improper selection of DG systems can reduce theseadvantages or even result in deterioration in the normal operation of the distribution system. DGallocation ...

G.B. Gharehpetian, S. Ghassem Zadeh, S. H. Hosseini,

A detailed model of wind power station, including Double Fed Induction Generator, DFIG is presented in this paper. Two control mechanisms are included in the model. The inner control system uses stator flux oriented control for the rotor side converter and grid voltage vector control for the grid side converter. The outer control system is used for wind turbine pitch angle. PSCAD/EMTDC is us...

The recent trends in electrical power distribution system operation and management are aimed at improving system conditions in order to render good service to the customer. The reforms in distribution sector have given major scope for employment of distributed generation (DG) resources which will boost the system performance. This paper proposes a heuristic technique for allocation of distribut...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید