نتایج جستجو برای: guo scheme

تعداد نتایج: 225472  

Journal: :iranian journal of oil & gas science and technology 2013
sadegh mahmoudi abdonabi hashemi shahin kord

this work is a primary achievement in studying the co2 and n2–oil systems. to predict gas-liquid relative permeability curves, a shan-chen type multicomponent multiphase lattice boltzmann model for two-phase flow through 2d porous media is developed. periodic and bounce back boundary conditions are applied to the model with the guo scheme for the external body force (i.e., the pressure gradient...

Journal: :IJESDF 2011
Debiao He

With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.’s [X. Guo, J. Zhang, Secure group key agreement protocol based on chaotic Hash, Information Sciences 180 (2010) 4069–4074] proposed a secure key agreement protocol based on chaotic Hash. They claimed that their scheme could withstand various at...

Journal: :I. J. Network Security 2015
Hu Xiong Ji Geng Zhiguang Qin Guobin Zhu

Signcryption can offer authentication and confidentiality simultaneously with better efficiency than traditional signature-then-encryption approach. Ring signature enables a user to conscribe arbitrarily a group of ring members and sign a message on behalf of the ring (which includes himself) without revealing his real identity. By integrating the notion of signcryption and ring signature, ring...

Journal: :J. Visual Communication and Image Representation 2014
Nasrollah Pakniat Mahnaz Noroozi Ziba Eslami

A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...

Journal: :I. J. Network Security 2017
Hongfeng Zhu Yifeng Zhang

Since the 1990s, chaotic systems have widely used to cryptography which can be used to design kinds of secure protocols, digital signatures, hash functions and so on. Recently, Guo and Zhang proposed an chaotic public-key cryptosystem based key agreement protocol. In 2015, Lee has proved that Guo et al.’s scheme cannot resist off-line password guess attack. Then, Liu and Xue further point out t...

Journal: :Photoniques 2015

This work is a primary achievement in studying the CO2 and N2–oil systems. To predict gas-liquid relative permeability curves, a Shan-Chen type multicomponent multiphase lattice Boltzmann model for two-phase flow through 2D porous media is developed. Periodic and bounce back boundary conditions are applied to the model with the Guo scheme for the external body force (i.e.,...

2001
Quji Guo Qian Zhang Wenwu Zhu Ya-Qin Zhang

† This work was performed while Quji Guo was a visiting student at Microsoft Research China. Quji Guo is with Department of Electrical & Computer Engineering, University of Illinois at Urbana-Champaign, Illinois, USA. ABSTRACT A new architecture of sender-adaptive and receiver-driven layered multicasting for video over Internet is presented in this paper. This architecture optimizes the overall...

2007
Wun-She Yap Swee-Huay Heng Bok-Min Goi

The concept of proxy signature was introduced by Mambo et al. to delegate signing capability in the digital world. In this paper, we show that three existing proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo et al. IBPS scheme and the Li et al. certificateless proxy signature (CLPS) scheme are insecure against universal ...

2010
Guo

Accurate species identication is a crucial step in forensic entomology, as the insect collected on a corpse can provide useful information for estimation of postmortem interval (PMI). The utility of the forensically important Sarcophagidae (Diptera) for crime scene investigation has been severely restricted, as morphological identification is difficult, especially the identification of females ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید