نتایج جستجو برای: namely identity

تعداد نتایج: 280440  

Journal: :IACR Cryptology ePrint Archive 2007
Sunder Lal Priyam Sharma

In this paper we analyze and find an anomaly in the security proof of the identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based on mBDHP. Here we give another proof for fullM-IBE which is based on Bilinear Diffie-Hellman Problem (BDHP). We also obtain a tightness improvement using a stronger assumption, namely, the Bilinear Inverse Dicision Diffie-Hellman problem ...

2004
Frédéric Rochon Richard B. Melrose François Lalonde

In the framework of fibred cusp operators on a manifold X associated to a boundary fibration Φ : ∂X → Y , the homotopy groups of the space G−∞ Φ (X;E) of invertible smoothing perturbations of the identity are computed in terms of the K-theory of T ∗Y . It is shown that there is a periodicity, namely the odd and the even homotopy groups are isomorphic among themselves. To obtain this result, one...

2010
Neyire Deniz Sarier

In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...

1992
Giuseppe Longo Kathleen Milsted Sergei Soloviev Giuseppe LONGO Kathleen MILSTED Sergei SOLOVIEV

This paper focuses on how terms of second order λ-calculus, which may take types as inputs, depend on types. These terms are generally understood to have an “essentially” constant meaning, in all models, on input types. We show how the proof theory of second order λ-calculus suggests a clear syntactic description of this phenomenon. Namely, under a reasonable condition, we show that identity of...

2006
Benjamin Aziz

We present in this technical report a non-uniform static analysis for detecting the term-substitution property in systems specified in the language of the applied pi calculus. The analysis implements a denotational framework that has previously introduced analyses for the pi calculus and the spi calculus. The main novelty of this analysis is its ability to deal with systems specified in languag...

Journal: :IACR Cryptology ePrint Archive 2005
Nuttapong Attrapadung Yang Cui David Galindo Goichiro Hanaoka Ichiro Hasuo Hideki Imai Kanta Matsuura Peng Yang Rui Zhang

This paper shows that the standard security notion for identity based encryption schemes (IBE), that is IND-ID-CCA2, captures the essence of security for all IBE schemes. To achieve this intention, we first describe formal definitions of the notions of security for IBE , and then present the relations among OW, IND, SS and NM in IBE , along with rigorous proofs. With the aim of comprehensivenes...

Journal: :International Journal of Geographical Information Science 2000
Kathleen Stewart Max J. Egenhofer

As efforts grow to develop spatio-temporal database systems and temporal geographic information systems that are capable of conveying how geographic phenomena change, it is important to distinguish the elements that are fundamental to scenarios of change. This paper presents a model based on the explicit description of change with respect to states of existence and non-existence for identifiabl...

Journal: :سیاست 0
فرهاد عطایی

this paper examines the evolution of nationalism and national identity in europe and how it was transferred to and propagated in central asia by the soviets. it further examines the challenge facing central asian peoples in the post-soviet era; namely in defining a new national identity for themselves as new independent nation-states in the age of globalization. the paper attempts to demonstrat...

2014
T. J. Stepień L. T. Stepień

This paper is the continuation of the paper [13]. Namely, in [13], the scope of the structural completeness in the class of all over-systems of the classical predicate calculus, has been established. In this paper we establish the scope of the structural completeness in the class of all over-systems of the classical functional calculus with identity.

Journal: :Appl. Math. Lett. 2007
George A. Anastassiou

We generalize Ostrowski inequality for higher order derivatives, by using a generalized Euler type identity. Some of the inequalities produced are sharp, namely attained by basic functions. The rest of the estimates are tight. We give applications to trapezoidal and mid-point rules. Estimates are given with respect to L∞ norm. c © 2006 Elsevier Ltd. All rights reserved.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید