Search Results

There are 96026 results for: content related to: Issues relating to selective reporting when including non-randomized studies in systematic reviews on the effects of healthcare interventions

  1. Variable proopiomelanocortin expression in tanycytes of the adult rat hypothalamus and pituitary stalk

    Journal of Comparative Neurology

    Volume 525, Issue 3, February 15, 2017, Pages: 411–441, Gábor Wittmann, Erzsébet Farkas, Anett Szilvásy-Szabó, Balázs Gereben, Csaba Fekete and Ronald M. Lechan

    Version of Record online : 2 SEP 2016, DOI: 10.1002/cne.24090

  2. Article alerts: items from 2010, part I

    Research Synthesis Methods

    Volume 2, Issue 2, June 2011, Pages: 131–138, Adam R. Hafdahl

    Version of Record online : 25 SEP 2011, DOI: 10.1002/jrsm.43

  3. You have free access to this content
    A conversation with Joseph Lau

    Research Synthesis Methods

    Volume 6, Issue 1, March 2015, Pages: 2–20, Joseph C. Cappelleri and Meghan Ingerick

    Version of Record online : 8 APR 2014, DOI: 10.1002/jrsm.1116

  4. On the solutions of a max-type difference equation system

    Mathematical Methods in the Applied Sciences

    Volume 38, Issue 17, 30 November 2015, Pages: 4388–4410, Y. Yazlik, D. T. Tollu and N. Taskara

    Version of Record online : 2 FEB 2015, DOI: 10.1002/mma.3377

  5. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  6. Real-variable characterizations of Musielak–Orlicz–Hardy spaces associated with Schrödinger operators on domains

    Mathematical Methods in the Applied Sciences

    Volume 39, Issue 3, February 2016, Pages: 533–569, Der-Chen Chang, Zunwei Fu, Dachun Yang and Sibei Yang

    Version of Record online : 3 JUN 2015, DOI: 10.1002/mma.3501

  7. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  8. Security analysis and design of an efficient ECC-based two-factor password authentication scheme

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4166–4181, Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri and Ruhul Amin

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1596

  9. Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3197–3218, Roger Jardí-Cedó, Jordi Castellà-Roca and Alexandre Viejo

    Version of Record online : 4 JUL 2016, DOI: 10.1002/sec.1526

  10. On the design of a secure user authentication and key agreement scheme for wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo and Muhammad Khurram Khan

    Version of Record online : 2 AUG 2016, DOI: 10.1002/cpe.3930

  11. Fuzzy certificateless signature

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3658–3669, Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen and Yu Long

    Version of Record online : 9 AUG 2016, DOI: 10.1002/sec.1572

  12. Privacy-preserving data search and sharing protocol for social networks through wireless applications

    Concurrency and Computation: Practice and Experience

    Xiaofen Wang, Yi Mu and Rongmao Chen

    Version of Record online : 27 MAY 2016, DOI: 10.1002/cpe.3870

  13. You have free access to this content
    Index

    Alimentary Pharmacology & Therapeutics

    Volume 18, Issue 11-12, December 2003, Pages: 1177–1190,

    Version of Record online : 4 DEC 2003, DOI: 10.1111/j.1365-2036.2003.01851.x

  14. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  15. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3777–3789, Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong and Kaoru Ota

    Version of Record online : 12 MAY 2016, DOI: 10.1002/sec.1490

  16. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  17. You have free access to this content
    Dr Leslie J. C. Bluck (1956–2014)

    Rapid Communications in Mass Spectrometry

    Volume 28, Issue 15, 15 August 2014, Pages: 1777–1778, Dietrich A. Volmer

    Version of Record online : 25 JUN 2014, DOI: 10.1002/rcm.6954

  18. Efficient certificate-based encryption schemes without pairing

    Security and Communication Networks

    Minh-Ha Le, Intae Kim and Seong Oun Hwang

    Version of Record online : 8 DEC 2016, DOI: 10.1002/sec.1703

  19. Winners of the 2012 JMS award

    Journal of Mass Spectrometry

    Volume 48, Issue 3, March 2013, Pages: 287–290, Richard M. Caprioli

    Version of Record online : 12 MAR 2013, DOI: 10.1002/jms.3171

  20. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3688–3702, Yinghui Zhang, Dong Zheng, Qi Li, Jin Li and Hui Li

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1574