نتایج جستجو برای: out scheme
تعداد نتایج: 1018417 فیلتر نتایج به سال:
in this paper high order multidimensional positive definite advection transport algorithm (mpdata) and compact finite difference methods are applied to one (1-d) and two-dimensional (2-d) advection equation. mpdata methods are designed based on upwind scheme using anti-diffusive velocity that compensates diffusivity of upwind method. in high order compact method one implicit relation between a ...
The most efficient previously proposed oblivious transfer schemes require t calls of 1-out-n oblivious transfer (OT) to construct the t-out-n OT. Its computational requirements and bandwidth consumption are quite demanding. Therefore, to guarantee the quality of growing popular communication service, an efficient t-out-n OT scheme with low bandwidth is urgently desired. Based on elliptic curve ...
In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.’s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay attack, denial of service attack on password changing and insider attack on it. But none of them suggested any solution...
Substituted 1, 2, 4- Triazoles have shown multiple biological activities such as anti-inflammatory, anti fungal, etc. 5-mercapto triazoles were prepared from the potassium dithiocarbazinates. These triazoles were used for preparation of different derivatives by two different schemes. In the first scheme the Mannich bases were prepared from 5- marcapto-s triazole Quinazolines. The 5-Marcato-s-Tr...
In 1998, Dwork et al. first proposed an application of zeroknowledge, deniable authentication protocol. Thereafter, there were many researches about the deniable authentication schemes. In 2004, Shao demonstrated out that the previous schemes had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and they proposed a new...
Hwang and Cheng proposed the first strong designated-verifier ring signature scheme providing one-out-of-all signer anonymity to hide the actual signer’s identity. Their scheme also provides signer admission to admit who the actual signer is. However, the computation and communication costs caused by the signer admission are heavy because their scheme needs all ring members’ Schnorr promises. T...
The aim of this paper is to study the high order difference scheme for the solution of a fractional partial differential equation (PDE) in the electroanalytical chemistry. The space fractional derivative is described in the Riemann-Liouville sense. In the proposed scheme we discretize the space derivative with a fourth-order compact scheme and use the Grunwald- Letnikov discretization of the Ri...
Long since it has been considered very important to develop capitals, increase economic growth, expand intra-regional economic communications and transactions and in short produce national wealth. Around late 1980’s, South Korean corporations began to invest in industries and corporations overseas, technically known as outward foreign direct investment (FDI). Initially, South Korean government ...
Abstract Background In 2003, Ghana implemented a National Health Insurance Scheme (NHIS) designed to promote universal health coverage and equitable access care. The scheme has largely been successful, yet it is confronted with many challenges threatening its sustainability. Out-of-pocket payments (OOP) by insured clients one of such the scheme. This study sought examine types services OOP char...
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید