• No results found

Analysis of the two Schemes

Analysis   and  Improvements  of  Two  Identity-Based  Perfect  Concurrent  Signature  Schemes

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes

... signature schemes, two entities can produce two signatures that are not binding, until an extra piece of information (namely the keystone) is released by one of the ...2005, two identity-based ...

18

Does subsidised temporary employment get the unemployed back to work? An econometric analysis of two different schemes

Does subsidised temporary employment get the unemployed back to work? An econometric analysis of two different schemes

... of two different schemes of subsi- dised temporary employment in ...the two schemes is that one operates as a non-profit employment programme, whereas the other one is a subsidy for temporary ...

45

An analysis of alternative wheat pricing schemes

An analysis of alternative wheat pricing schemes

... last two schemes, which seek a high level of self sufficiency, performed well mainly because the particular model used in this study ignored fixed costs and the[r] ...

58

Security Analysis of Two Lightweight Certificateless Signature Schemes

Security Analysis of Two Lightweight Certificateless Signature Schemes

... • Output: VALID if σ is a valid signature on m and INVALID otherwise. 2.2 Security Model To call a CLS scheme secure, it should provide existen- tially unforgeability against adaptive chosen-message and -identity attacks ...

7

Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking

Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking

... theoretical analysis results are validated by Monte Carlo simulation, the optimal polarity detector shows significant performance gain compared with the original polarity detection ...

8

Norwegian beef trade with Botswana and Namibia : an analysis of the two quota-schemes

Norwegian beef trade with Botswana and Namibia : an analysis of the two quota-schemes

... export revenues for these two countries, then a FCFS method might be more preferable than auction. Despite plans to take the beef trade out of the GSP-system and include all 3,200 tons in the FTA between EFTA and ...

112

Comparative analysis of the two Acinetobacter baumannii multilocus sequence typing (MLST) schemes

Comparative analysis of the two Acinetobacter baumannii multilocus sequence typing (MLST) schemes

... both schemes due to the low level of resolution or polyphyly of Sts ( Castillo-Ramírez and Graña-Miraglia, 2019 ...both schemes to provide a finer ...MLST schemes in the ...the two available ...

14

Energy Efficiency Analysis of Two-Tier MIMO Diversity Schemes in Poisson Cellular Networks

Energy Efficiency Analysis of Two-Tier MIMO Diversity Schemes in Poisson Cellular Networks

... a two tier rate adaptive cellular ...the schemes which strike a good balance between the achievable maximum throughput and the consumed power (both increasing with the number of RF chains ...

15

Energy Efficiency Analysis of Two-Tier MIMO Diversity Schemes in Poisson Cellular Networks

Energy Efficiency Analysis of Two-Tier MIMO Diversity Schemes in Poisson Cellular Networks

... In the case of femto-cell deployments, [20] addressed the compromise between spectral efficiency or throughput and EE for a two tier network consisting of macro-cells and a given number [r] ...

15

Performance Analysis of FTL Schemes

Performance Analysis of FTL Schemes

... 2.3.5 Demand paged mapping Scheme (DFTL) DFTL [10] Recently a page level based mapping scheme called Demand paged Flash translation Layer i.e. DFTL has presented by Gupta. It has much better performance. It maintains ...

6

Cryptanalysis  of  Iterated  Even-Mansour  Schemes  with  Two  Keys

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

... key, two keys, or completely independent ...Even-Mansour schemes with two n-bit keys and up to four rounds, and show that none of them provides more than n-bit ...the analysis of the parts, ...

21

Comparing  Two  Pairing-Based  Aggregate  Signature  Schemes

Comparing Two Pairing-Based Aggregate Signature Schemes

... Lastly, elements in G T can be compressed from 3072 bits to 1024 bits using the techniques described in [20]. We will ignore the G T compression and decompression costs in our performance analysis of signature ...

22

Two local time stepping schemes for parabolic problems

Two local time stepping schemes for parabolic problems

... difference schemes in the refined and coarse zones using an explicit approximation at the interface on a larger mesh size in order to attenuate the time step limitation due to the explicit ...between two ...

15

Performance analysis of joint relay selection and transmission schemes in multiple antenna two way relay systems

Performance analysis of joint relay selection and transmission schemes in multiple antenna two way relay systems

... transmission schemes or the RS schemes has been well investigated, but a best combination of the transmission and RS schemes under a certain perfor- mance criterion is not known, especially in ...

14

Does subsidised temporary employment get the unemployed back to work? An econometric analysis of two different schemes

Does subsidised temporary employment get the unemployed back to work? An econometric analysis of two different schemes

... An argument against the human capital explanation is the fact that the subsidised temporary jobs are often below the qualification of the unemployed they usually pay less than unemployme[r] ...

50

An Analysis on Biometric Template Protection Schemes

An Analysis on Biometric Template Protection Schemes

... template database, matcher, and decision module (see Figure 1&2). Sensor is the interface between the user and the authentication system that scan the biometric features of the user. Feature extraction module used the ...

5

Comparative Analysis on Visual Cryptographic Schemes

Comparative Analysis on Visual Cryptographic Schemes

... The main merit of this scheme is individual share cannot infer any information and thus no decryption is made possible. Many enhancements have been proposed by keeping this concept as base [4]. In [5], the concept of ...

7

Two way relaying schemes in full duplex cellular system

Two way relaying schemes in full duplex cellular system

... Theoretical analysis and simulation results not only substantiate the significant capacity gains obtained by the proposed DF relaying scheme but also provide useful tools for best relaying mode selection in ...

12

A Comparative Study of Two Spatial Discretization Schemes for Advection Equation

A Comparative Study of Two Spatial Discretization Schemes for Advection Equation

... This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ Abstract In this paper, we describe a comparison of two spatial ...

8

The Improvement of Relay Selection Schemes in Two Hop Cellular Networks

The Improvement of Relay Selection Schemes in Two Hop Cellular Networks

... our analysis and show that the semi-distri- buted scheme outperforms the switch-and-examine ...the two re- lay selection schemes can achieve much more capacity than direct transmission at high SNR ...

11

Show all 10000 documents...

Related subjects