Search Results

There are 9306 results for: content related to: New construction of affiliation-hiding authenticated group key agreement

  1. Multiple solutions of a quasilinear elliptic problem involving nonlinear boundary condition on exterior domain

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 7, 15 May 2012, Pages: 782–794, Caisheng Chen and Qi Zhang

    Article first published online : 4 APR 2012, DOI: 10.1002/mma.1606

  2. Modulating optical second harmonic generation of impurity-doped quantum dots in presence of Gaussian white noise

    physica status solidi (b)

    Jayanta Ganguly and Manas Ghosh

    Article first published online : 3 FEB 2016, DOI: 10.1002/pssb.201552606

  3. On a mathematical model of age–cycle length structured cell population with non-compact boundary conditions (II)

    Mathematical Methods in the Applied Sciences

    Mohamed Boulanouar

    Article first published online : 26 AUG 2015, DOI: 10.1002/mma.3606

  4. Evaluating the potential effects from probabilistic selling of similar products

    Naval Research Logistics (NRL)

    Volume 61, Issue 8, December 2014, Pages: 604–620, Yongbo Xiao and Jian Chen

    Article first published online : 6 NOV 2014, DOI: 10.1002/nav.21606

  5. Vector representation of graph domination

    Journal of Graph Theory

    Volume 70, Issue 2, June 2012, Pages: 152–170, Noga Zewi

    Article first published online : 14 APR 2011, DOI: 10.1002/jgt.20606

  6. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Article first published online : 26 JAN 2016, DOI: 10.1002/sec.1420

  7. A concurrent atomistic and continuum coupling method with applications to thermo-mechanical problems

    International Journal for Numerical Methods in Engineering

    Volume 97, Issue 10, 09 March 2014, Pages: 707–738, S. B. Ramisetti, G. Anciaux and J. F. Molinari

    Article first published online : 13 DEC 2013, DOI: 10.1002/nme.4606

  8. Sparse canonical correlation analysis from a predictive point of view

    Biometrical Journal

    Volume 57, Issue 5, September 2015, Pages: 834–851, Ines Wilms and Christophe Croux

    Article first published online : 6 JUL 2015, DOI: 10.1002/bimj.201400226

  9. Banking Panics, Information, and Rational Expectations Equilibrium

    The Journal of Finance

    Volume 43, Issue 3, July 1988, Pages: 749–761, V. V. CHARI and RAVI JAGANNATHAN

    Article first published online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1988.tb04606.x

  10. K-anonymity against neighborhood attacks in weighted social networks

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3864–3882, Chuan-Gang Liu, I-Hsien Liu, Wun-Sheng Yao and Jung-Shian Li

    Article first published online : 22 JUL 2015, DOI: 10.1002/sec.1306

  11. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Article first published online : 19 FEB 2014, DOI: 10.1002/sec.964

  12. An extended quadrature-based mass-velocity moment model for polydisperse bubbly flows

    The Canadian Journal of Chemical Engineering

    Volume 92, Issue 12, December 2014, Pages: 2053–2066, Cansheng Yuan, Bo Kong, Alberto Passalacqua and Rodney O. Fox

    Article first published online : 1 OCT 2014, DOI: 10.1002/cjce.22006

  13. Vision-based Localization and Robot-centric Mapping in Riverine Environments

    Journal of Field Robotics

    Junho Yang, Ashwin Dani, Soon-Jo Chung and Seth Hutchinson

    Article first published online : 23 SEP 2015, DOI: 10.1002/rob.21606

  14. Robust bottleneck routing games


    Volume 66, Issue 1, August 2015, Pages: 57–66, Thomas L. Werth, Sabine Büttner and Sven O. Krumke

    Article first published online : 10 JUN 2015, DOI: 10.1002/net.21606

  15. You have free access to this content
    A 1-D analytical method for estimating surface water–groundwater interactions and effective thermal diffusivity using temperature time series

    Water Resources Research

    Volume 48, Issue 11, November 2012, A. M. McCallum, M. S. Andersen, G. C. Rau and R. I. Acworth

    Article first published online : 30 NOV 2012, DOI: 10.1029/2012WR012007

  16. Micromechanics of ITZ-Aggregate Interaction in Concrete Part II: Strength Upscaling

    Journal of the American Ceramic Society

    Volume 97, Issue 2, February 2014, Pages: 543–551, Markus Königsberger, Bernhard Pichler and Christian Hellmich

    Article first published online : 28 OCT 2013, DOI: 10.1111/jace.12606

  17. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  18. Interactions between waves, sediment, and turbulence on a shallow estuarine mudflat

    Journal of Geophysical Research: Oceans

    Volume 119, Issue 3, March 2014, Pages: 1534–1553, Lissa J. MacVean and Jessica R. Lacy

    Article first published online : 5 MAR 2014, DOI: 10.1002/2013JC009477

  19. Managerial Delegation Contracts under Centralized Unionization

    Managerial and Decision Economics

    Volume 35, Issue 1, January 2014, Pages: 51–66, Nicola Meccheri and Luciano Fanti

    Article first published online : 11 MAR 2013, DOI: 10.1002/mde.2606

  20. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006