The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a practical public key encryption scheme which is provable chosen cipher text(CCA) secure based on the gap computational linear Diffie-Hellman assumption in the standard model. This is the first CCA secure scheme based on the gap computational linear Diffie-Hellman assumption. This scheme is efficient and the proof of the security is tight. We also reduce the size of the public...
The algebraic method with computerized symbolic computation is applied to construct a series of travelling wave solutions for the generalized KP_BBM equation. Compared with most existing symbolic computation methods such as tanh method and sine-cosine method gives new and more general solutions. And the result implies that the tupes of the solution not only depend on the parameters of the nonlinear...
For the difficulty of pseudo-random sequence generation, on the basis of construction research of the first class m subsequence, this paper realizes m subsequence based on shift register theory and deduces feedback function expression of m subsequence and analyses linear complexity of sequence by applying B-M algorithm. The analysis shows that linear complexity of m subsequence is larger than linear...
Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this paper, we explore anti-jamming schemes based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.