-
1
-
2
Universal composable threshold signature
Published 2009-01-01“…Threshold signature allowed any subset of t parties generating a signature,but that disallowed the creation of a valid signature if fewer than t parties participate in the protocol.Since the security of threshold signature was only con-sidered in a single instance before,the universal composability framework was introduced.The framework with its secu-rity preserving composition property allowed for modular design and analysis of the threshold signature.The defined ideal functionality of threshold signature is proved equals to the standard security notion of threshold signature.Further-more,how to applying the ideal functionality is described.The proposed threshold signature protocol and proactive threshold signature protocol are not only provably secure,but also universally composable.…”
Get full text
Article -
3
Marsilea: an intuitive generalized paradigm for composable visualizations
Published 2025-01-01Get full text
Article -
4
Extensive composable entropy for the analysis of cosmological data
Published 2025-02-01“…This functional is extensive (as required by thermodynamics) and composable, ∀(α,γ). Being extensive means that in the micro-canonical, or uniform, ensemble where all micro-state occur with the same probability, the entropy becomes proportional to N asymptotically: S(N)∝N for N→∞. …”
Get full text
Article -
5
ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES
Published 2014-06-01“…To put it otherwise, the research aims to test the market efficiency hypothesis in the sector of ETF-composed portfolios. The research methodology centers on statistically testing the null hypothesis whether the average S&P500 return and each of the ETF-composed portfolio strategies average returns are equal to zero. …”
Get full text
Article -
6
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01“…The fair problem of secure multiparty computation protocol was investigated in the universally composable framework. A fair secure multiparty computation model with ideal functionalities was firstly formulated such as a fair secure multiparty addition computation and a fair secure multiparty multiplicative computation. …”
Get full text
Article -
7
On Consensus of Star-Composed Networks with an Application of Laplacian Spectrum
Published 2017-01-01“…In particular, we introduce the notion of the corona of two graphs to construct star-composed networks and apply the Laplacian spectrum to discuss the convergence speed and robustness for the communication network. …”
Get full text
Article -
8
SHIELDING OF NOISE SOURCES USING ACOUSTIC SCREENS COMPOSED
Published 2020-03-01Get full text
Article -
9
Fair and rational delegation of computation in the universally composable framework
Published 2021-09-01Subjects: Get full text
Article -
10
Universally composable oblivious transfer protocol based on VSPH
Published 2007-01-01Subjects: Get full text
Article -
11
SPELLBOUND BY SOUNDTRACKS. AN INTERVIEW WITH FILM SCORE COMPOSER AARON FAZAKAS
Published 2014-12-01Subjects: Get full text
Article -
12
Project symphony: Composing a masterpiece in a science laboratory
Published 2025-02-01Get full text
Article -
13
Composable information flow verification for service chain based on model checking
Published 2014-11-01Subjects: Get full text
Article -
14
AI Composers and Cyborg Performers: More-than-human Creativity in Music
Published 2022-12-01Get full text
Article -
15
Robust optimization of stabilizing piles for landslides composed of soil–rock mixtures
Published 2025-03-01“…Colluvial landslides are mainly composed of soil–rock mixtures with complex composition and structure, resulting in large uncertainties in mechanical properties. …”
Get full text
Article -
16
Curing Kinetics of Hybrid Networks Composed of Benzoxazine and Multifunctional Novolac Epoxy
Published 2015-01-01“…A novel hybrid network composed of benzoxazines (BZ) and novolac epoxy resin (F-51) was prepared successfully. …”
Get full text
Article -
17
Self-adaptive encryption algorithm for image based on affine and composed chaos
Published 2012-11-01“…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
Get full text
Article -
18
THE PORTRAIT OF RUXANDA IN THE OPERA ”ALEXANDRU LĂPUŞNEANU” OF THE BESSARABIAN COMPOSER GHEORGHE MUSTEA
Published 2014-12-01Subjects: Get full text
Article -
19
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
20
On the Filtration Efficiency of Composite Media Composed of Multiple Layers of Electret Media
Published 2021-03-01Get full text
Article