ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Mathematics
Computing
Pure sciences
Technology
Research
Computing
Education
Languages
Literature
Biology
all records (47)

Languages
English

Countries
Indonesia
USA
Chile
Ukraine
Brazil
Canada
Australia
Italy
Russia
United Arab Emirates
all records (32)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (19)

Filter  
 
156  Articles
1 of 17 pages  |  10  records  |  more records»
An electronic cash system allows the exchange of digital coins with value assured by the bank’s signature and with concealed user identity. In an electronic cash system, a user can withdraw coins from the bank and then spends each coin anonymously and unl... see more

Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been pro... see more

The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time. One line of research with this double motivation is the study ... see more

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme... see more

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve s... see more

Mobile Ad Hoc Network is a self-configurable and self-organizing wireless network of mobile devices without fixed infrastructure support, which makes it a good candidate as underlying communication network for the Cyber-Physical Systems in emergency condi... see more

This paper introduces continuous-like linear operators on bilinear spaces as a generalization of continuous linear operators on Hilbert spaces. It is well known that the existence of the adjoint of a linear operator on a Hilbert space is equivalent to the... see more

In this study a generalization of the Riesz representation theorem on non-degenerate bilinear spaces, particularly on spaces of truncated Laurent series, was developed. It was shown that any linear functional on a non-degenerate bilinear space is represen... see more

The Runge-Kutta (RK)-Butcher algorithm is used to study the timevarying singular bilinear systems with the exact solutions. The results (discrete solutions) obtained using the Haar wavelets, Single-Term Walsh series (STWS) and RK-Butcher algorithms are co... see more

1 of 17 pages  |  10  records  |  more records»