Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

PDF

University of Wollongong

2007

Remarks

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Remarks On Accessible Steady States For Some Coagulation-Fragmentation Systems, Miguel A. Herrero, Marianito R. Rodrigo Jan 2007

Remarks On Accessible Steady States For Some Coagulation-Fragmentation Systems, Miguel A. Herrero, Marianito R. Rodrigo

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper we consider some systems of ordinary differential equations which are related to coagulation-fragmentation processes. In particular, we obtain explicit solutions of such systems which involve certain coefficients obtained by solving a suitable algebraic recurrence relation. The coefficients are derived in two relevant cases: the high-functionality limit and the Flory-Stockmayer model. The solutions thus obtained are polydisperse (that is, is different from zero for all ) and may exhibit monotonically increasing or decreasing total mass. We also solve a monodisperse case (where is different from zero but is equal to zero for all ) in the high-functionality limit. …


Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao Jan 2007

Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …