نتایج جستجو برای: modiriat abe shahri
تعداد نتایج: 1929 فیلتر نتایج به سال:
This paper describes an artificial bandwidth extension (ABE) method that generates new high frequency components to a narrowband signal by folding specifically gained subbands to frequencies from 4 kHz to 7 kHz, and improves the quality and intelligibility of narrowband speech in mobile devices. The proposed algorithm was evaluated by subjective listening tests. In addition, rarely used convers...
The extant literature offers little to describe the processes for screening students in adult basic education (ABE) programs for potential learning disabilities, referring adult students for diagnostic assessment, or barriers to obtaining diagnostic assessment for a learning disability. Without current documentation of a learning disability, ABE students are excluded from obtaining accommodatio...
Attribute-based encryption (ABE) has potential to be applied in cloud computing applications to provide fine-grained access control over encrypted data. However, the computation cost of ABE is considerably expensive, because the pairing and exponentiation operations grow with the complexity of access formula. In this work, we propose a fully outsourced ciphertextpolicy ABE scheme that for the f...
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and Suzuki’s scheme only provides receipt-freeness for losing bidders. We argue that it is more important to provide receipt-freeness for winners and propose a new receipt-free sealed bid auction scheme using the homomorp...
Motivation & State-of-the-Art Cryptographic tools for securing multicast communications: Broadcast Encryption (BE): transmit data to a dynamically changing set of recipients o Info about receivers is broadcast in the clear Receivers’ identities often sensitive. Secure communication ought to protect more than just transmitted content! Anonymous BE (ABE) [BBW06]: also hides receiver set Current b...
Traditional system in cryptography allows just sharing of keys between the sender and receiver, for such a technique only the signature storage is provided for the user’s public key. But as the number of users increases, it’s became a challenging job to have such a certificate storage as well as key distribution, to overcome this Identity Based Encryption (IBE) was proposed, but again it had cr...
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme com...
BACKGROUND Butanol is not only an important solvent and chemical intermediate in food and pharmaceutical industries, but also considered as an advanced biofuel. Recently, there have been resurging interests in producing biobutanol especially using low-cost lignocellulosic biomass, but the process still suffers from low titer and productivity. The challenge for the bioconversion approach is to f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید