Search Results

There are 10748 results for: content related to: Analysis on the generalization of proxy signature

  1. The design of conditional access mechanism for ubiquitous video on demand services

    Security and Communication Networks

    Yu-Yi Chen, Der-Chen Huang and Meng-Lin Tsai

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.381

  2. Optimal incentive policy in delay tolerant networks with limited cost

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 788–799, Yahui Wu, Su Deng and Hongbin Huang

    Article first published online : 19 APR 2013, DOI: 10.1002/sec.781

  3. Linear Analysis of the Corticothalamic Model with Time Delay

    Electronics and Communications in Japan

    Volume 97, Issue 8, August 2014, Pages: 32–44, Ikuhiro Yamaguchi, Yutaro Ogawa, Hiroya Nakao, Yasuhiko Jimbo and Kiyoshi Kotani

    Article first published online : 9 JUL 2014, DOI: 10.1002/ecj.11581

  4. Strategic obfuscation of production capacities

    Naval Research Logistics (NRL)

    Volume 61, Issue 3, April 2014, Pages: 244–267, Elizabeth J. Durango-Cohen and Liad Wagman

    Article first published online : 2 APR 2014, DOI: 10.1002/nav.21581

  5. A Koiter-Newton approach for nonlinear structural analysis

    International Journal for Numerical Methods in Engineering

    Volume 96, Issue 12, 21 December 2013, Pages: 763–786, Ke Liang, Mostafa Abdalla and Zafer Gürdal

    Article first published online : 3 OCT 2013, DOI: 10.1002/nme.4581

  6. A unique isolated dwarf spheroidal galaxy at D = 1.9 Mpc

    Monthly Notices of the Royal Astronomical Society

    Volume 425, Issue 1, 1 September 2012, Pages: 709–719, Dmitry Makarov, Lidia Makarova, Margarita Sharina, Roman Uklein, Anton Tikhonov, Puragra Guhathakurta, Evan Kirby and Natalya Terekhova

    Article first published online : 17 AUG 2012, DOI: 10.1111/j.1365-2966.2012.21581.x

  7. Algorithm for analysis of flows in ribbed annuli

    International Journal for Numerical Methods in Fluids

    Volume 68, Issue 7, 10 March 2012, Pages: 805–838, H. V. Moradi and J. M. Floryan

    Article first published online : 2 MAY 2011, DOI: 10.1002/fld.2581

  8. A comparative study on the free volume theories for diffusivity through polymeric membrane in pervaporation process

    Journal of Applied Polymer Science

    Volume 131, Issue 15, 5 August 2014, Amirhossein Mafi, Ahmadreza Raisi, Mohsen Hatam and Abdolreza Aroujalian

    Article first published online : 10 MAR 2014, DOI: 10.1002/app.40581

  9. Synchronization and Adaptive Anti-Synchronization Control for Lorenz Systems under Channel Noise with Applications

    Asian Journal of Control

    Volume 15, Issue 3, May 2013, Pages: 919–929, Bin Liu, Jian-Ping Li and Weixing Zheng

    Article first published online : 27 JUL 2012, DOI: 10.1002/asjc.581

  10. Outlier Detection for Healthcare Quality Monitoring – A Comparison of Four Approaches to Over-Dispersed Proportions

    Quality and Reliability Engineering International

    Volume 30, Issue 3, April 2014, Pages: 347–362, Gaj Vidmar and Rok Blagus

    Article first published online : 7 NOV 2013, DOI: 10.1002/qre.1581

  11. Combination of gravimetric and altimetric space observations for estimating oceanic polar motion excitations

    Journal of Geophysical Research: Oceans (1978–2012)

    Volume 117, Issue C10, October 2012, F. Göttl, M. Schmidt, R. Heinkelmann, R. Savcenko and J. Bouman

    Article first published online : 25 OCT 2012, DOI: 10.1029/2012JC007915

  12. Regression with incomplete covariates and left-truncated time-to-event data

    Statistics in Medicine

    Volume 32, Issue 6, 15 March 2013, Pages: 1004–1015, Hua Shen and Richard J. Cook

    Article first published online : 28 AUG 2012, DOI: 10.1002/sim.5581

  13. Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 4, April 2014, Pages: 445–460, Azzam Y. Al-nahari, Ioannis Krikidis, Ahmed S. Ibrahim, Moawad I. Dessouky and Fathi E. Abd El-Samie

    Article first published online : 7 NOV 2012, DOI: 10.1002/ett.2581

  14. Nonlinear anisotropic parabolic equations in RN with locally integrable data

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 2, 30 January 2013, Pages: 196–207, Fares Mokhtari

    Article first published online : 18 JUN 2012, DOI: 10.1002/mma.2581

  15. Electrochemical control of specific adhesion between amine-functionalized polymers and noble metal electrode interfaces

    Materials and Corrosion

    Volume 65, Issue 4, April 2014, Pages: 362–369, S. H. Donaldson Jr., T. Utzig, M. A. Gebbie, S. Raman, B. R. Shrestha, J. N. Israelachvili and M. Valtiner

    Article first published online : 6 MAR 2014, DOI: 10.1002/maco.201307581

  16. A simple geomorphic-based analytical model for predicting the spatial distribution of soil thickness in headwater hillslopes and catchments

    Water Resources Research

    Volume 49, Issue 11, November 2013, Pages: 7733–7746, Jintao Liu, Xi Chen, Henry Lin, Hu Liu and Huiqing Song

    Article first published online : 26 NOV 2013, DOI: 10.1002/2013WR013834

  17. The design of authentication key protocol in certificate-free public key cryptosystem

    Security and Communication Networks

    Yu-Fang Chung

    Article first published online : 10 DEC 2013, DOI: 10.1002/sec.924

  18. An Analysis of Some Functions That Generalizes Weighted Means and OWA Operators

    International Journal of Intelligent Systems

    Volume 28, Issue 4, April 2013, Pages: 380–393, Bonifacio Llamazares

    Article first published online : 7 JAN 2013, DOI: 10.1002/int.21581

  19. Long-term Futures Curves and Seasonal Structures of Wheat in the European Union and the United States

    Journal of Futures Markets

    Volume 33, Issue 12, December 2013, Pages: 1118–1142, Sergio H. Lence, Hervé G. Ott and Chad E. Hart

    Article first published online : 16 AUG 2012, DOI: 10.1002/fut.21581

  20. Efficient pairing-free provably secure identity-based proxy blind signature scheme

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 593–601, Zuowen Tan

    Article first published online : 25 JUN 2012, DOI: 10.1002/sec.582