We discover an error in the quantum circuit in Fig. 2 in the original paper [ Y.G. Yang, Q.Y. Wen. Opt. Commun. 283 (2010) 3198–3201 ]. Corrected results are obtained and presented in this paper.
We discover an error in the quantum circuit in Fig. 2 in the original paper [ Y.G. Yang, Q.Y. Wen. Opt. Commun. 283 (2010) 3198–3201 ]. Corrected results are obtained and presented in this paper.
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive design environment. In this paper, a method to generate a highlight line model on an ar...
详细信息
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive design environment. In this paper, a method to generate a highlight line model on an arbitrary triangular mesh is presented. Based on the highlight line model, a technique to remove local shape irregularities of a triangular mesh is then presented. The shape modification is done by solving a minimization problem and performing an iterative procedure. The new technique improves not only the shape quality of the mesh surface, but also the shape of the highlight line model. It provides an intuitive and yet suitable method for locally optimizing the shape of a triangular mesh.
With the development of attack technique, new security problems have become more and more popular, traditional security means such as: firewall, IDS and so on expose to be limited, there is a basic consensus that solv...
详细信息
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,...
详细信息
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate o...
详细信息
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate of the linear complexities of this family of GMW *** the result shows that such sequences have large linear complexities.
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into...
详细信息
SMS4 is a 128-bit block cipher, which is used in the WAPI standard in China. This paper examines algebraic attacks on SMS4 over two different fields, that is, GF(2) and GF(28), respectively. With regards to this, we f...
详细信息
This work is the case study based on the remote sensing data about squall line in Shanghai at July 12 2004, focus on the analysis on Doppler radar echo products, satellite image, surface and sounding data, automatic w...
详细信息
In order to improve the accuracy of trust evaluation of subscribers (or key holders) from relying parties' point of view, a new model of trust degrees for PKI is proposed. By analyzing the security risks during th...
详细信息
暂无评论