Search Results

There are 18948 results for: content related to: A communication and computation-efficient three-party authenticated key agreement protocol

  1. Asymptotic distribution of the numbers of vertices and arcs of the giant strong component in sparse random digraphs

    Random Structures & Algorithms

    Volume 49, Issue 1, August 2016, Pages: 3–64, Boris Pittel and Daniel Poole

    Version of Record online : 18 NOV 2015, DOI: 10.1002/rsa.20622

  2. You have full text access to this Open Access content
    One-time identity–password authenticated key agreement scheme based on biometrics

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2350–2360, Hongfeng Zhu

    Version of Record online : 10 FEB 2015, DOI: 10.1002/sec.1182

  3. Generalized Prioritized Multicriteria Aggregation

    International Journal of Intelligent Systems

    Volume 28, Issue 12, December 2013, Pages: 1141–1161, Xiaohan Yu, Zeshui Xu and Shousheng Liu

    Version of Record online : 4 SEP 2013, DOI: 10.1002/int.21622

  4. Model averaged double robust estimation

    Biometrics

    Volume 73, Issue 2, June 2017, Pages: 410–421, Matthew Cefalu, Francesca Dominici, Nils Arvold and Giovanni Parmigiani

    Version of Record online : 28 NOV 2016, DOI: 10.1111/biom.12622

  5. You have free access to this content
    Critical nodes for distance-based connectivity and related problems in graphs

    Networks

    Volume 66, Issue 3, October 2015, Pages: 170–195, Alexander Veremyev, Oleg A. Prokopyev and Eduardo L. Pasiliao

    Version of Record online : 22 JUL 2015, DOI: 10.1002/net.21622

  6. You have full text access to this OnlineOpen article
    Hyperstate matrix models: extending demographic state spaces to higher dimensions

    Methods in Ecology and Evolution

    Volume 7, Issue 12, December 2016, Pages: 1438–1450, Gregory Roth and Hal Caswell

    Version of Record online : 29 SEP 2016, DOI: 10.1111/2041-210X.12622

  7. System identification by operatorial cancellation of nonlinear terms and application to a class of Volterra models

    International Journal of Robust and Nonlinear Control

    Volume 27, Issue 8, 25 May 2017, Pages: 1211–1241, C. Casenave, E. Montseny and G. Montseny

    Version of Record online : 15 AUG 2016, DOI: 10.1002/rnc.3622

  8. You have full text access to this Open Access content
    Two-factor mutual authentication with key agreement in wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 171–183, Binod Vaidya, Dimitrios Makrakis and Hussein Mouftah

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.517

  9. A simplification of a real-time verification problem

    Software Testing, Verification and Reliability

    Volume 26, Issue 8, December 2016, Pages: 548–571, Suman Roy, Janardan Misra and Indranil Saha

    Version of Record online : 10 OCT 2016, DOI: 10.1002/stvr.1622

  10. You have free access to this content
    An existence and uniqueness principle for a nonlinear version of the Lebowitz-Rubinow model with infinite maximum cycle length

    Mathematical Methods in the Applied Sciences

    Volume 41, Issue 1, 15 January 2018, Pages: 407–422, David Ariza-Ruiz, Jesús Garcia-Falset and Khalid Latrach

    Version of Record online : 19 OCT 2017, DOI: 10.1002/mma.4622

  11. You have full text access to this Open Access content
    Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2405–2411, Liping Zhang, Shanyu Tang and Zhihua Cai

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.951

  12. A high order finite volume method for one dimensional nonlocal reactive flows of parabolic type

    Mathematical Methods in the Applied Sciences

    Volume 39, Issue 8, May 2016, Pages: 2065–2077, Lejuan Wang and Min Yang

    Version of Record online : 4 DEC 2015, DOI: 10.1002/mma.3622

  13. Capital Structure and the Market for Corporate Control: The Defensive Role of Debt Financing

    The Journal of Finance

    Volume 46, Issue 4, September 1991, Pages: 1391–1409, RONEN ISRAEL

    Version of Record online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1991.tb04622.x

  14. Possibility of the existence of blow-up solutions to quasilinear degenerate Keller–Segel systems of parabolic–parabolic type

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 7, 15 May 2013, Pages: 745–760, Sachiko Ishida, Takashi Ono and Tomomi Yokota

    Version of Record online : 15 JUN 2012, DOI: 10.1002/mma.2622

  15. You have free access to this content
    Dynamic capillary effects in a small-volume unsaturated porous medium: Implications of sensor response and gas pressure gradients for understanding system dependencies

    Water Resources Research

    Volume 48, Issue 11, November 2012, Lili Hou, Lixia Chen and Tohren C. G. Kibbey

    Version of Record online : 16 NOV 2012, DOI: 10.1029/2012WR012434

  16. Model parameter estimation and residual life prediction for a partially observable failing system

    Naval Research Logistics (NRL)

    Volume 62, Issue 3, April 2015, Pages: 190–205, Akram Khaleghei and Viliam Makis

    Version of Record online : 2 APR 2015, DOI: 10.1002/nav.21622

  17. You have full text access to this Open Access content
    Applying biometrics to design three-factor remote user authentication scheme with key agreement

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1488–1497, Xiong Li, Jianwei Niu, Zhibo Wang and Caisen Chen

    Version of Record online : 10 APR 2013, DOI: 10.1002/sec.767

  18. Homotopy approach for random eigenvalue problem

    International Journal for Numerical Methods in Engineering

    Volume 113, Issue 3, 20 January 2018, Pages: 450–478, Bin Huang, Heng Zhang and Kok-Kwang Phoon

    Version of Record online : 12 SEP 2017, DOI: 10.1002/nme.5622

  19. You have full text access to this Open Access content
    Chaotic map-based three-party authenticated key agreement

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2469–2474, Han-Yu Lin

    Version of Record online : 28 JAN 2014, DOI: 10.1002/sec.960

  20. Näherung für elastisch-plastische Kerbbeanspruchungen einschließend thermisch induzierte Beanspruchungen

    Materialwissenschaft und Werkstofftechnik

    Volume 47, Issue 10, October 2016, Pages: 944–957, A. Bosch and J. Rudolph

    Version of Record online : 6 OCT 2016, DOI: 10.1002/mawe.201600622