نتایج جستجو برای: namely identity
تعداد نتایج: 280440 فیلتر نتایج به سال:
In this paper we analyze and find an anomaly in the security proof of the identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based on mBDHP. Here we give another proof for fullM-IBE which is based on Bilinear Diffie-Hellman Problem (BDHP). We also obtain a tightness improvement using a stronger assumption, namely, the Bilinear Inverse Dicision Diffie-Hellman problem ...
In the framework of fibred cusp operators on a manifold X associated to a boundary fibration Φ : ∂X → Y , the homotopy groups of the space G−∞ Φ (X;E) of invertible smoothing perturbations of the identity are computed in terms of the K-theory of T ∗Y . It is shown that there is a periodicity, namely the odd and the even homotopy groups are isomorphic among themselves. To obtain this result, one...
In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...
This paper focuses on how terms of second order λ-calculus, which may take types as inputs, depend on types. These terms are generally understood to have an “essentially” constant meaning, in all models, on input types. We show how the proof theory of second order λ-calculus suggests a clear syntactic description of this phenomenon. Namely, under a reasonable condition, we show that identity of...
We present in this technical report a non-uniform static analysis for detecting the term-substitution property in systems specified in the language of the applied pi calculus. The analysis implements a denotational framework that has previously introduced analyses for the pi calculus and the spi calculus. The main novelty of this analysis is its ability to deal with systems specified in languag...
This paper shows that the standard security notion for identity based encryption schemes (IBE), that is IND-ID-CCA2, captures the essence of security for all IBE schemes. To achieve this intention, we first describe formal definitions of the notions of security for IBE , and then present the relations among OW, IND, SS and NM in IBE , along with rigorous proofs. With the aim of comprehensivenes...
As efforts grow to develop spatio-temporal database systems and temporal geographic information systems that are capable of conveying how geographic phenomena change, it is important to distinguish the elements that are fundamental to scenarios of change. This paper presents a model based on the explicit description of change with respect to states of existence and non-existence for identifiabl...
this paper examines the evolution of nationalism and national identity in europe and how it was transferred to and propagated in central asia by the soviets. it further examines the challenge facing central asian peoples in the post-soviet era; namely in defining a new national identity for themselves as new independent nation-states in the age of globalization. the paper attempts to demonstrat...
This paper is the continuation of the paper [13]. Namely, in [13], the scope of the structural completeness in the class of all over-systems of the classical predicate calculus, has been established. In this paper we establish the scope of the structural completeness in the class of all over-systems of the classical functional calculus with identity.
We generalize Ostrowski inequality for higher order derivatives, by using a generalized Euler type identity. Some of the inequalities produced are sharp, namely attained by basic functions. The rest of the estimates are tight. We give applications to trapezoidal and mid-point rules. Estimates are given with respect to L∞ norm. c © 2006 Elsevier Ltd. All rights reserved.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید