نتایج جستجو برای: guo scheme
تعداد نتایج: 225472 فیلتر نتایج به سال:
this work is a primary achievement in studying the co2 and n2–oil systems. to predict gas-liquid relative permeability curves, a shan-chen type multicomponent multiphase lattice boltzmann model for two-phase flow through 2d porous media is developed. periodic and bounce back boundary conditions are applied to the model with the guo scheme for the external body force (i.e., the pressure gradient...
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.’s [X. Guo, J. Zhang, Secure group key agreement protocol based on chaotic Hash, Information Sciences 180 (2010) 4069–4074] proposed a secure key agreement protocol based on chaotic Hash. They claimed that their scheme could withstand various at...
Signcryption can offer authentication and confidentiality simultaneously with better efficiency than traditional signature-then-encryption approach. Ring signature enables a user to conscribe arbitrarily a group of ring members and sign a message on behalf of the ring (which includes himself) without revealing his real identity. By integrating the notion of signcryption and ring signature, ring...
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...
Since the 1990s, chaotic systems have widely used to cryptography which can be used to design kinds of secure protocols, digital signatures, hash functions and so on. Recently, Guo and Zhang proposed an chaotic public-key cryptosystem based key agreement protocol. In 2015, Lee has proved that Guo et al.’s scheme cannot resist off-line password guess attack. Then, Liu and Xue further point out t...
This work is a primary achievement in studying the CO2 and N2–oil systems. To predict gas-liquid relative permeability curves, a Shan-Chen type multicomponent multiphase lattice Boltzmann model for two-phase flow through 2D porous media is developed. Periodic and bounce back boundary conditions are applied to the model with the Guo scheme for the external body force (i.e.,...
† This work was performed while Quji Guo was a visiting student at Microsoft Research China. Quji Guo is with Department of Electrical & Computer Engineering, University of Illinois at Urbana-Champaign, Illinois, USA. ABSTRACT A new architecture of sender-adaptive and receiver-driven layered multicasting for video over Internet is presented in this paper. This architecture optimizes the overall...
The concept of proxy signature was introduced by Mambo et al. to delegate signing capability in the digital world. In this paper, we show that three existing proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo et al. IBPS scheme and the Li et al. certificateless proxy signature (CLPS) scheme are insecure against universal ...
Accurate species identication is a crucial step in forensic entomology, as the insect collected on a corpse can provide useful information for estimation of postmortem interval (PMI). The utility of the forensically important Sarcophagidae (Diptera) for crime scene investigation has been severely restricted, as morphological identification is difficult, especially the identification of females ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید