نتایج جستجو برای: signature matrices

تعداد نتایج: 140686  

Journal: :IEEE Access 2023

Memory Denial of Service (M-DoS) attacks refer to a class cyber-attacks that aim exhaust the memory resources system, rendering it unavailable legitimate users. This type attack is particularly dangerous in cloud computing environments, where multiple users share same resources. Detection and mitigation M-DoS real-time challenging task, as they often involve large number low-rate requests, maki...

2000
Adam L. Young Moti Yung

We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastructure where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable/escrow cryptography. The basic dilemma is that on the one...

Journal: :IACR Cryptology ePrint Archive 2016
Quentin Alamélou Olivier Blazy Stéphane Cauchie Philippe Gaborit

This work is the extended version of [1] which proposed the first code-based group signature. The new group signature scheme we present here has numerous advantages over all existing post-quantum constructions and even competes (in terms of properties) with pairing based constructions: it allows to add new members during the lifetime of the group (dynamic). Plus, it appears that our scheme migh...

Journal: :mathematics interdisciplinary research 0
sejong kim chungbuk national university

in this article we review an algebraic definition of the gyrogroup and a simplified version of the gyrovector space with two fundamental examples on the open ball of finite-dimensional euclidean space, which are the einstein and möbius gyrovector spaces. we introduce the structure of gyrovector space and the gyroline on the open convex cone of positive definite matrices and see its interest...

Somayeh Hadjirezaei, Somayeh Karimzadeh

 In this paper we characterize all $2times 2$ idempotent and nilpotent matrices over an integral domain and then we characterize all $2times 2$ strongly nil-clean matrices over a PID. Also, we determine when a $2times 2$ matrix  over a UFD is nil-clean.

ژورنال: پژوهش های ریاضی 2020

Doubly stochastic matrices play a fundamental role in the theory of majorization. Birkhoff's theorem explains the relation between $ntimes n$ doubly stochastic matrices and permutations. In this paper, we first introduce double-null  operators and we will find some important properties of them. Then with the help of double-null operators, we investigate Birkhoff's theorem for descreate $l^p$ sp...

H Mehrgan SA Mortazavi

In this study, the effects of various hydrophilic (HPMC and Carbopol 971) and plastic (Ethylcellulose and Eudragit RL100) polymers on the release profile of diltiazem HCl from matrix tablets were evaluated in-vitro. For this purpose, tablets containing 60 mg of diltiazem HCl along with various amounts of the aforementioned polymers were prepared using the wet granulation technique. Tablets prep...

In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده علوم 1387

چکیده ندارد.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید