نتایج جستجو برای: signature matrices
تعداد نتایج: 140686 فیلتر نتایج به سال:
Memory Denial of Service (M-DoS) attacks refer to a class cyber-attacks that aim exhaust the memory resources system, rendering it unavailable legitimate users. This type attack is particularly dangerous in cloud computing environments, where multiple users share same resources. Detection and mitigation M-DoS real-time challenging task, as they often involve large number low-rate requests, maki...
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastructure where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable/escrow cryptography. The basic dilemma is that on the one...
This work is the extended version of [1] which proposed the first code-based group signature. The new group signature scheme we present here has numerous advantages over all existing post-quantum constructions and even competes (in terms of properties) with pairing based constructions: it allows to add new members during the lifetime of the group (dynamic). Plus, it appears that our scheme migh...
in this article we review an algebraic definition of the gyrogroup and a simplified version of the gyrovector space with two fundamental examples on the open ball of finite-dimensional euclidean space, which are the einstein and möbius gyrovector spaces. we introduce the structure of gyrovector space and the gyroline on the open convex cone of positive definite matrices and see its interest...
In this paper we characterize all $2times 2$ idempotent and nilpotent matrices over an integral domain and then we characterize all $2times 2$ strongly nil-clean matrices over a PID. Also, we determine when a $2times 2$ matrix over a UFD is nil-clean.
Doubly stochastic matrices play a fundamental role in the theory of majorization. Birkhoff's theorem explains the relation between $ntimes n$ doubly stochastic matrices and permutations. In this paper, we first introduce double-null operators and we will find some important properties of them. Then with the help of double-null operators, we investigate Birkhoff's theorem for descreate $l^p$ sp...
In this study, the effects of various hydrophilic (HPMC and Carbopol 971) and plastic (Ethylcellulose and Eudragit RL100) polymers on the release profile of diltiazem HCl from matrix tablets were evaluated in-vitro. For this purpose, tablets containing 60 mg of diltiazem HCl along with various amounts of the aforementioned polymers were prepared using the wet granulation technique. Tablets prep...
In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...
چکیده ندارد.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید