نتایج جستجو برای: lagrange identity
تعداد نتایج: 127744 فیلتر نتایج به سال:
Although Named Data Networking (NDN) architecture introduced security mechanisms and built the NDN basic service model, there are still privacy challenges such as consumer identity privacy, signer identity privacy, the disclosure of the ISP based on the identity privacy information, and the third party attack. Under the NDN basic service model, we analyze these privacy problems in detail and es...
The physical variables of classical thermodynamics occur in conjugate pairs such as pressure/volume, entropy/temperature, chemical potential/particle number. Nevertheless, and unlike in classical mechanics, there are an odd number of such thermodynamic coordinates. We review the formulation of thermo-dynamics and geometrical optics in terms of contact geometry. The Lagrange bracket provides a g...
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was pro...
The distinguishing characteristic of the elliptic restricted three-body problem is a time-varying potential field resulting in non-autonomous and non-integrable dynamics. The purpose of this study is to normalize the system dynamics about the circular case and about one of the triangular Lagrange points by applying a method of canonical perturbation theory introduced by Hori and Deprit in the 1...
We generalize cyclic refinements of Jensen’s inequality from a convex function to a higher-order convex function by means of Lagrange–Green’s function and Fink’s identity. We formulate the monotonicity of the linear functionals obtained from these identities utilizing the theory of inequalities for n-convex functions at a point. New Grüssand Ostrowski-type bounds are found for identities associ...
The problem of counting plane trees with n edges and an even or an odd number of leaves was studied by Eu, Liu and Yeh, in connection with an identity on coloring nets due to Stanley. This identity was also obtained by Bonin, Shapiro and Simion in their study of Schröder paths, and it was recently derived by Coker using the Lagrange inversion formula. An equivalent problem for partitions of set...
We estimate the distribution function of a Lagrange interpolation polynomial and deduce mean boundedness in Lp; p < 1: 1 The Result There is a vast literature on mean convergence of Lagrange interpolation, see [4{ 8] for recent references. In this note, we use distribution functions to investigate mean convergence. We believe the simplicity of the approach merits attention. Recall that if g : R...
In 2010, Fan et al. presented an anonymous multi-receiver identity-based encryption scheme where they adopt Lagrange interpolating polynomial mechanism. They showed that their scheme makes it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed. They also formally showed that every receive...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید