Journal articles on the topic 'Proofs Schemes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Proofs Schemes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
DEMİRCİ, Niymet, Ülkü ÇOBAN SURAL, and Neşe IŞIK TERTEMİZ. "A Study on the Proofs Used by Primary Education Teacher Candidates in Circumference Problem Solutions and Instructional Explanations." International Journal of Psychology and Educational Studies 9 (October 23, 2022): 1027–46. http://dx.doi.org/10.52380/ijpes.2022.9.4.782.
Full textXu, Qing, Chenyang Gao, and Yunling Wang. "Aggregatable Subvector Commitment with Efficient Updates." Applied Sciences 15, no. 2 (2025): 554. https://doi.org/10.3390/app15020554.
Full textZhandry, Mark. "Secure identity-based encryption in the quantum random oracle model." International Journal of Quantum Information 13, no. 04 (2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Full textJankvist, Uffe Thomas, and Morten Misfeldt. "CAS Assisted Proofs in Upper Secondary School Mathematics Textbooks." Journal of Research in Mathematics Education 8, no. 3 (2019): 232. http://dx.doi.org/10.17583/redimat.2019.3315.
Full textMa, Xiongfeng, and Norbert Lutkenhaus. "Improved Data Post-Processing in Quantum Key Distribution and Application to Loss Thresholds in device independent QKD." Quantum Information and Computation 12, no. 3&4 (2012): 203–14. http://dx.doi.org/10.26421/qic12.3-4-2.
Full textLunzhi Deng, Lunzhi Deng, Zhenyu Hu Lunzhi Deng, Yu Ruan Zhenyu Hu, and Tao Wang Yu Ruan. "Provably Secure Certificateless Proxy Signature Scheme in the Standard Model." 網際網路技術學刊 23, no. 2 (2022): 279–88. http://dx.doi.org/10.53106/160792642022032302008.
Full textBellare, M., and G. Neven. "Transitive Signatures: New Schemes and Proofs." IEEE Transactions on Information Theory 51, no. 6 (2005): 2133–51. http://dx.doi.org/10.1109/tit.2005.847697.
Full textWang, Chen, Zi-Yuan Liu, and Masahiro Mambo. "On the Proof of Ownership of Digital Wallets." Cryptography 8, no. 4 (2024): 57. https://doi.org/10.3390/cryptography8040057.
Full textAydın, Ayhan, and Taha Mohammed. "New accurate conservative finite difference schemes for 1-D and 2-D Schrödinger-Boussinesq Equations." Cumhuriyet Science Journal 45, no. 4 (2024): 777–88. https://doi.org/10.17776/csj.1445761.
Full textZhao, Xinjian, Fei Xia, Hanning Xia, Yunlong Mao, and Shi Chen. "A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication." Electronics 13, no. 14 (2024): 2730. http://dx.doi.org/10.3390/electronics13142730.
Full textSantoso, Bagus, and Chunhua Su. "A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 294–308. https://doi.org/10.3217/jucs-025-03-0294.
Full textMüller, Andreas. "Review of the exponential and Cayley map on SE(3) as relevant for Lie group integration of the generalized Poisson equation and flexible multibody systems." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2253 (2021): 20210303. http://dx.doi.org/10.1098/rspa.2021.0303.
Full textHindley, J. Roger, and David Meredith. "Principal type-schemes and condensed detachment." Journal of Symbolic Logic 55, no. 1 (1990): 90–105. http://dx.doi.org/10.2307/2274956.
Full textHussain, Nawab, Vivek Kumar, Preety Malik, and Renu Chugh. "Jungck-type implicit iterative algorithms with numerical examples." Filomat 31, no. 8 (2017): 2303–20. http://dx.doi.org/10.2298/fil1708303h.
Full textOflaz, Gülçin, Kübra Polat, Duygu Altaylı Özgül, Mario Alcaide, and José Carrillo. "A Comparative Research on Proving: The Case of Prospective Mathematics Teachers." Higher Education Studies 9, no. 4 (2019): 92. http://dx.doi.org/10.5539/hes.v9n4p92.
Full textYılmaz Akkurt, Yasemin, and Soner Durmuş. "Tracing proof schemes: some patterns and new perspectives." JRAMathEdu (Journal of Research and Advances in Mathematics Education) 7, no. 1 (2022): 1–16. http://dx.doi.org/10.23917/jramathedu.v7i1.15740.
Full textTiplea, Ferucio Laurentiu, Cristian Hristea, and Rodica Bulai. "Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure." Computer Science Journal of Moldova 30, no. 3(90) (2022): 335–59. http://dx.doi.org/10.56415/csjm.v30.18.
Full textZhang, Yitian, Yuming Tang, Zijian Zhang, et al. "Blockchain-Based Practical and Privacy-Preserving Federated Learning with Verifiable Fairness." Mathematics 11, no. 5 (2023): 1091. http://dx.doi.org/10.3390/math11051091.
Full textHyeon, Donghoon, and Hyungju Park. "Grothendieck–Plücker Images of Hilbert Schemes are Degenerate." Proceedings of the Edinburgh Mathematical Society 62, no. 1 (2018): 47–60. http://dx.doi.org/10.1017/s0013091518000421.
Full textSu, Ziyi, Shiwei Wang, Hongliu Cai, et al. "A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof." Electronics 13, no. 18 (2024): 3735. http://dx.doi.org/10.3390/electronics13183735.
Full textBellare, Mihir, Chanathip Namprempre, and Gregory Neven. "Security Proofs for Identity-Based Identification and Signature Schemes." Journal of Cryptology 22, no. 1 (2008): 1–61. http://dx.doi.org/10.1007/s00145-008-9028-8.
Full textDeng, Cunle, Chushan Zhang, and Qiaodan Tan. "Anonymous and Traceable: A Dynamic Group Signature-Based Cross-Domain Authentication for IIoT." Mathematics 13, no. 13 (2025): 2127. https://doi.org/10.3390/math13132127.
Full textYuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.
Full textS, Sheela Angel, Suthika K, Yahitha S, Sruti D, and S. A. Arunmozhi Dr. "Strengthening Security and Privacy in VANETs: Advancements in Ring Signcryption Based Protection." International Journal of Multidisciplinary Research Transactions 6, no. 5 (2024): 108–16. https://doi.org/10.5281/zenodo.11184337.
Full textBokanowski, Olivier, Athena Picarelli, and Christoph Reisinger. "High-order filtered schemes for time-dependent second order HJB equations." ESAIM: Mathematical Modelling and Numerical Analysis 52, no. 1 (2018): 69–97. http://dx.doi.org/10.1051/m2an/2017039.
Full textHu, Shunfang, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou, and Peng Duan. "Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT." Applied Sciences 14, no. 8 (2024): 3187. http://dx.doi.org/10.3390/app14083187.
Full textWu, Ge, Zhen Zhao, Fuchun Guo, Willy Susilo, and Futai Zhang. "On the General Construction of Tightly Secure Identity-Based Signature Schemes." Computer Journal 63, no. 12 (2020): 1835–48. http://dx.doi.org/10.1093/comjnl/bxaa011.
Full textKrämer, Juliane, Patrick Struck, and Maximiliane Weishäupl. "Committing AE from Sponges." IACR Transactions on Symmetric Cryptology 2024, no. 4 (2024): 191–248. https://doi.org/10.46586/tosc.v2024.i4.191-248.
Full textHirasaka, Mitsugu, Kijung Kim, and Ilia Ponomarenko. "Two-valenced association schemes and the Desargues theorem." Arabian Journal of Mathematics 9, no. 3 (2019): 481–93. http://dx.doi.org/10.1007/s40065-019-00274-w.
Full textKandii, S. O., and I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model." Radiotekhnika, no. 214 (September 29, 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Full textLian, Bin, Gong Liang Chen, and Jian Hua Li. "A Provably Secure E-Cash Scheme with Loss-Tracing." Advanced Materials Research 748 (August 2013): 958–66. http://dx.doi.org/10.4028/www.scientific.net/amr.748.958.
Full textWang, Qiang, Fucai Zhou, Jian Xu, and Zifeng Xu. "A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications." Computer Journal 63, no. 4 (2019): 633–47. http://dx.doi.org/10.1093/comjnl/bxz115.
Full textDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Full textMa, Wen Qi, Qing Bo Wu, and Yu Song Tan. "A TPA Based Efficient Non-Repudiation Scheme for Cloud Storage." Advanced Materials Research 765-767 (September 2013): 1630–35. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1630.
Full textEr-Wei Bai and S. Sastry. "Global stability proofs for continuous-time indirect adaptive control schemes." IEEE Transactions on Automatic Control 32, no. 6 (1987): 537–43. http://dx.doi.org/10.1109/tac.1987.1104660.
Full textBellini, Emanuele, Chiara Marcolla, and Nadir Murru. "An Application of p-Fibonacci Error-Correcting Codes to Cryptography." Mathematics 9, no. 7 (2021): 789. http://dx.doi.org/10.3390/math9070789.
Full textZhao, Yi, Kaitai Liang, Bo Yang, and Liqun Chen. "CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs." Security and Communication Networks 2019 (October 31, 2019): 1–8. http://dx.doi.org/10.1155/2019/8357241.
Full textZhang, Xiujie, Xingbing Fu, Lu Hong, Yu Liu, and Liangliang Wang. "Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network." International Journal of Distributed Sensor Networks 16, no. 6 (2020): 155014772092873. http://dx.doi.org/10.1177/1550147720928733.
Full textGonzalez, Juan A. Navarro. "Differential spaces of finite type." Mathematical Proceedings of the Cambridge Philosophical Society 117, no. 2 (1995): 371–84. http://dx.doi.org/10.1017/s0305004100073199.
Full textGu, Jie, Lijuan Nong, Qian Yi, and An Chen. "Compact Difference Schemes with Temporal Uniform/Non-Uniform Meshes for Time-Fractional Black–Scholes Equation." Fractal and Fractional 7, no. 4 (2023): 340. http://dx.doi.org/10.3390/fractalfract7040340.
Full textJi, Yunfeng, Yuting Xiao, Birou Gao, and Rui Zhang. "Threshold/Multi Adaptor Signature and Their Applications in Blockchains." Electronics 13, no. 1 (2023): 76. http://dx.doi.org/10.3390/electronics13010076.
Full textKang, Baoyuan, and Danhui Xu. "Secure Electronic Cash Scheme with Anonymity Revocation." Mobile Information Systems 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/2620141.
Full textCao, Zhu. "Quantum private function evaluation." New Journal of Physics 25, no. 10 (2023): 103027. http://dx.doi.org/10.1088/1367-2630/acffec.
Full textKnees, Dorothee. "Convergence analysis of time-discretisation schemes for rate-independent systems." ESAIM: Control, Optimisation and Calculus of Variations 25 (2019): 65. http://dx.doi.org/10.1051/cocv/2018048.
Full textGueron, Shay, Edoardo Persichetti, and Paolo Santini. "Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup." Cryptography 6, no. 1 (2022): 5. http://dx.doi.org/10.3390/cryptography6010005.
Full textAkat, M., R. Kosker, and A. Sirma. "On the numerical schemes for Langevin-type equations." BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS 99, no. 3 (2020): 62–74. http://dx.doi.org/10.31489/2020m3/62-74.
Full textSeppala-Holtzman, D. N. "Ancient Egyptians and Russian Peasants Foretell the Digital Age." Mathematics Teacher 100, no. 9 (2007): 632–35. http://dx.doi.org/10.5951/mt.100.9.0632.
Full textSeppala-Holtzman, D. N. "Ancient Egyptians and Russian Peasants Foretell the Digital Age." Mathematics Teacher 100, no. 9 (2007): 632–35. http://dx.doi.org/10.5951/mt.100.9.0632.
Full textJiang, Wenbao, Jin Ding, and Haibao Zhang. "Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption." Applied Sciences 15, no. 7 (2025): 3723. https://doi.org/10.3390/app15073723.
Full textXu, Ronghua, Deeraj Nagothu, and Yu Chen. "EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks." Future Internet 13, no. 10 (2021): 248. http://dx.doi.org/10.3390/fi13100248.
Full text