Search Results

There are 4184 results for: content related to: A private online system for executing wills based on a secret sharing mechanism

  1. You have full text access to this Open Access content
    Security enhancement of the communication-efficient AUTHMAC_DH protocols

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 674–680, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Version of Record online : 29 SEP 2011, DOI: 10.1002/sec.361

  2. Fault detection for discrete-time switched singular time-delay systems: an average dwell time approach

    International Journal of Adaptive Control and Signal Processing

    Volume 27, Issue 7, July 2013, Pages: 582–609, Jinxing Lin, Shumin Fei, Zhifeng Gao and Jie Ding

    Version of Record online : 22 AUG 2012, DOI: 10.1002/acs.2329

  3. You have full text access to this Open Access content
    Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.364

  4. Impact of wind integration on electricity markets: a chance-constrained Nash Cournot model

    International Transactions on Electrical Energy Systems

    Volume 23, Issue 1, January 2013, Pages: 83–96, M. Mazadi, W. D. Rosehart, H. Zareipour, O. P. Malik and M. Oloomi

    Version of Record online : 3 NOV 2011, DOI: 10.1002/etep.650

  5. Self-tuning weighted fusion Kalman filter for ARMA signal with colored measurement noise and its convergence analysis

    International Journal of Adaptive Control and Signal Processing

    Volume 26, Issue 9, September 2012, Pages: 861–878, Jinfang Liu and Zili Deng

    Version of Record online : 14 FEB 2012, DOI: 10.1002/acs.2277

  6. Quantized H∞ filtering for Markovian jump LPV systems with intermittent measurements

    International Journal of Robust and Nonlinear Control

    Volume 23, Issue 1, 10 January 2013, Pages: 1–14, Xiuming Yao, Ligang Wu and Wei Xing Zheng

    Version of Record online : 21 SEP 2011, DOI: 10.1002/rnc.1809

  7. You have full text access to this Open Access content
    Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Version of Record online : 1 SEP 2011, DOI: 10.1002/sec.371

  8. You have full text access to this Open Access content
    A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.346

  9. You have full text access to this Open Access content
    Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  10. Robust H deconvolution filtering for uncertain singular Markovian jump systems with time-varying delays

    International Journal of Robust and Nonlinear Control

    Volume 26, Issue 12, August 2016, Pages: 2564–2585, Guangming Zhuang, Shengyuan Xu, Baoyong Zhang, Huiling Xu and Yuming Chu

    Version of Record online : 12 OCT 2015, DOI: 10.1002/rnc.3461

  11. Traditional Inference and Its Versions in the Combined Calculus

    The Philosophical Forum

    Volume 46, Issue 2, Summer 2015, Pages: 155–174, Lei Ma

    Version of Record online : 12 APR 2015, DOI: 10.1111/phil.12062

  12. A generalized robust H ∞  filtering for singular Markovian jump systems and its applications

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 18, December 2014, Pages: 3491–3507, Guoliang Wang, Peng Zhang and Qingling Zhang

    Version of Record online : 4 SEP 2013, DOI: 10.1002/rnc.3072

  13. You have full text access to this Open Access content
    Efficient multiple-collision trapdoor hash family

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 681–688, Sattar J. Aboud and Abid T. Al Ajeeli

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.363

  14. Robust H ∞  filtering for a class of uncertain stochastic hybrid neutral systems with time-varying delay

    International Journal of Adaptive Control and Signal Processing

    Volume 27, Issue 6, June 2013, Pages: 462–477, Jie Lian, Zhi Feng and Peng Shi

    Version of Record online : 9 JUL 2012, DOI: 10.1002/acs.2316

  15. Exponential H ∞  filtering for stochastic Markovian jump systems with time delays

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 4, 10 March 2014, Pages: 625–643, Yun Chen and Wei Xing Zheng

    Version of Record online : 20 SEP 2012, DOI: 10.1002/rnc.2909

  16. High-gain observers for leak location in subterranean pipelines of liquefied petroleum gas

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 6, April 2014, Pages: 1127–1141, L. Torres, C. Verde, G. Besançon and O. González

    Version of Record online : 18 SEP 2012, DOI: 10.1002/rnc.2897

  17. You have full text access to this Open Access content
    Discovering AODV-based multipath routes in wireless ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 374–383, Gang Li and Hongmei Sun

    Version of Record online : 31 MAY 2011, DOI: 10.1002/sec.322

  18. Finite-time H ∞  filtering for a class of discrete-time Markovian jump systems with partly unknown transition probabilities

    International Journal of Adaptive Control and Signal Processing

    Volume 28, Issue 10, October 2014, Pages: 1024–1042, Jun Cheng, Hong Zhu, Shouming Zhong, Yong Zeng and Liyuan Hou

    Version of Record online : 24 JUL 2013, DOI: 10.1002/acs.2425

  19. You have full text access to this Open Access content
    Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Version of Record online : 4 MAY 2011, DOI: 10.1002/sec.326

  20. You have full text access to this Open Access content
    Adaptive pattern mining model for early detection of botnet-propagation scale

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 917–927, Do Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong and Hoh Peter In

    Version of Record online : 6 OCT 2011, DOI: 10.1002/sec.366