期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
New Asymptotic Results on Fermat-Wiles Theorem
1
作者 Kimou Kouadio Prosper Kouakou Kouassi Vincent Tanoé François 《Advances in Pure Mathematics》 2024年第6期421-441,共21页
We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Dio... We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp. 展开更多
关键词 Fermat’s Last Theorem Fermat-Wiles Theorem Kimou’s Divisors Diophantine Quotient Diophantine Remainders Balzano Weierstrass Analysis Theorem
下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
2
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部