Search Results

There are 80032 results for: content related to: A lightweight micropayment scheme based on Lagrange interpolation formula

  1. CCA2 secure public-key encryption scheme tolerating continual leakage attacks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4505–4519, YanWei Zhou, Bo Yang, Wenzheng Zhang and Yi Mu

    Version of Record online : 19 OCT 2016, DOI: 10.1002/sec.1643

  2. Augmenting the Edge-Connectivity of a Hypergraph by Adding a Multipartite Graph

    Journal of Graph Theory

    Volume 72, Issue 3, March 2013, Pages: 291–312, Attila Bernáth, Roland Grappe and Zoltán Szigeti

    Version of Record online : 18 JUN 2012, DOI: 10.1002/jgt.21643

  3. Selling to strategic and loss-averse consumers: Stocking, procurement, and product design policies

    Naval Research Logistics (NRL)

    Volume 62, Issue 6, September 2015, Pages: 435–453, Chang Hwan Lee, Tsan-Ming Choi and T.C.E. Cheng

    Version of Record online : 8 SEP 2015, DOI: 10.1002/nav.21643

  4. You have free access to this content
    Discrepancy properties for random regular digraphs

    Random Structures & Algorithms

    Volume 50, Issue 1, January 2017, Pages: 23–58, Nicholas A. Cook

    Version of Record online : 1 MAR 2016, DOI: 10.1002/rsa.20643

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. Global adaptive regulation control for a class of nonlinear systems with unknown control coefficients

    International Journal of Adaptive Control and Signal Processing

    Volume 30, Issue 6, June 2016, Pages: 843–863, Jiangbo Yu, Hongli Lv and Yuqiang Wu

    Version of Record online : 3 NOV 2015, DOI: 10.1002/acs.2643

  7. Existence, blow-up, and exponential decay estimates for a system of semilinear wave equations associated with the helicalflows of Maxwell fluid

    Mathematical Methods in the Applied Sciences

    Volume 39, Issue 9, June 2016, Pages: 2334–2357, Le Thi Phuong Ngoc, Cao Huu Hoa and Nguyen Thanh Long

    Version of Record online : 29 SEP 2015, DOI: 10.1002/mma.3643

  8. Volatility, Efficiency, and Trading: Evidence from the Japanese Stock Market

    The Journal of Finance

    Volume 46, Issue 5, December 1991, Pages: 1765–1789, YAKOV AMIHUD and HAIM MENDELSON

    Version of Record online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1991.tb04643.x

  9. Robust output-control for uncertain linear systems: Homogeneous differentiator-based observer approach

    International Journal of Robust and Nonlinear Control

    H. Ríos, M. Mera, D. Efimov and A. Polyakov

    Version of Record online : 3 SEP 2016, DOI: 10.1002/rnc.3643

  10. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4098–4109, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 25 AUG 2015, DOI: 10.1002/sec.1326

  11. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  12. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  13. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  14. You have full text access to this OnlineOpen article
    Visualizing energy landscapes with metric disconnectivity graphs

    Journal of Computational Chemistry

    Volume 35, Issue 20, July 30, 2014, Pages: 1481–1490, Lewis C. Smeeton, Mark T. Oakley and Roy L. Johnston

    Version of Record online : 28 MAY 2014, DOI: 10.1002/jcc.23643

  15. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  16. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1223–1236, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Version of Record online : 21 JUL 2014, DOI: 10.1002/sec.1076

  17. Efficient certificate-based encryption schemes without pairing

    Security and Communication Networks

    Minh-Ha Le, Intae Kim and Seong Oun Hwang

    Version of Record online : 8 DEC 2016, DOI: 10.1002/sec.1703

  18. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  19. Provably secure three-factor authentication and key agreement scheme for session initiation protocol

    Security and Communication Networks

    Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu and Xiong Li

    Version of Record online : 28 NOV 2016, DOI: 10.1002/sec.1707

  20. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592