Search Results

There are 7339 results for: content related to: Provably secure revocable ID-based signature in the standard model

  1. Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing

    Security and Communication Networks

    Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 17 NOV 2016, DOI: 10.1002/sec.1696

  2. Minimal disconnected cuts in planar graphs

    Networks

    Volume 68, Issue 4, December 2016, Pages: 250–259, Marcin Kamiński, Daniël Paulusma, Anthony Stewart and Dimitrios M. Thilikos

    Version of Record online : 8 AUG 2016, DOI: 10.1002/net.21696

  3. Braess's paradox for the spectral gap in random graphs and delocalization of eigenvectors

    Random Structures & Algorithms

    Ronen Eldan, Miklós Z. Rácz and Tselil Schramm

    Version of Record online : 21 NOV 2016, DOI: 10.1002/rsa.20696

  4. Derivative and Differential Operations of Intuitionistic Fuzzy Numbers

    International Journal of Intelligent Systems

    Volume 30, Issue 4, April 2015, Pages: 468–498, Qian Lei and Zeshui Xu

    Version of Record online : 12 DEC 2014, DOI: 10.1002/int.21696

  5. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1223–1236, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Version of Record online : 21 JUL 2014, DOI: 10.1002/sec.1076

  6. Upper Bounds for Erdös–Hajnal Coefficients of Tournaments

    Journal of Graph Theory

    Volume 74, Issue 1, September 2013, Pages: 122–132, Krzysztof Choromanski

    Version of Record online : 19 SEP 2012, DOI: 10.1002/jgt.21696

  7. Are the Latent Variables in Time-Varying Expected Returns Compensation for Consumption Risk?

    The Journal of Finance

    Volume 45, Issue 2, June 1990, Pages: 397–429, WAYNE E. FERSON

    Version of Record online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1990.tb03696.x

  8. Identity-based universal re-encryption for mixnets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 2992–3001, Habib Allah Yajam, Javad Mohajeri and Mahmoud Salmasizadeh

    Version of Record online : 18 FEB 2015, DOI: 10.1002/sec.1226

  9. Validity of Lagrange (Bézier) and rational Bézier quads of degree 2

    International Journal for Numerical Methods in Engineering

    Volume 99, Issue 8, 24 August 2014, Pages: 611–632, P.L. George and H. Borouchaki

    Version of Record online : 27 MAY 2014, DOI: 10.1002/nme.4696

  10. Censored correlated cytokine concentrations: multivariate Tobit regression using clustered variance estimation

    Statistics in Medicine

    Volume 32, Issue 16, 20 July 2013, Pages: 2859–2874, Andreas Andersen, Christine S. Benn, Mathias J. Jørgensen and Henrik Ravn

    Version of Record online : 5 DEC 2012, DOI: 10.1002/sim.5696

  11. An ID-based node key management scheme based on PTPM in MANETs

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2816–2826, Guang Yang, Jiqiang Liu and Lei Han

    Version of Record online : 12 MAR 2015, DOI: 10.1002/sec.1206

  12. Flexible Magnetic Filaments and their Applications

    Advanced Functional Materials

    Volume 26, Issue 22, June 14, 2016, Pages: 3783–3795, Andrejs Cebers and Kaspars Erglis

    Version of Record online : 25 FEB 2016, DOI: 10.1002/adfm.201502696

  13. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  14. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  15. Multi-layer transmission and hybrid relaying for relay channels with multiple out-of-band relays

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 9, September 2014, Pages: 895–904, Seok-Hwan Park, Osvaldo Simeone, Onur Sahin and Shlomo Shamai (Shitz)

    Version of Record online : 13 AUG 2013, DOI: 10.1002/ett.2696

  16. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Version of Record online : 28 AUG 2013, DOI: 10.1002/sec.845

  17. Nonlinear pricing with consumer satiation

    Naval Research Logistics (NRL)

    Volume 63, Issue 5, August 2016, Pages: 386–400, Hui Xiong and Ying-Ju Chen

    Version of Record online : 18 JUL 2016, DOI: 10.1002/nav.21696

  18. Semi-global output feedback control for nonlinear systems with uncertain time-delay and output function

    International Journal of Robust and Nonlinear Control

    Xue-Jun Xie, Zhan-Jie Li and Kemei Zhang

    Version of Record online : 4 NOV 2016, DOI: 10.1002/rnc.3696

  19. Fractional-order switching type control law design for adaptive sliding mode technique of 3D fractional-order nonlinear systems

    Complexity

    Volume 21, Issue 6, July/August 2016, Pages: 363–373, Chun Yin, Yuhua Cheng, Shou-Ming Zhong and Zhanbing Bai

    Version of Record online : 29 MAY 2015, DOI: 10.1002/cplx.21696

  20. Inverse determination of the penalty parameter in penalized weighted least-squares algorithm for noise reduction of low-dose CBCT

    Medical Physics

    Volume 38, Issue 7, July 2011, Pages: 4066–4072, Jing Wang, Huaiqun Guan and Timothy Solberg

    Version of Record online : 22 JUN 2011, DOI: 10.1118/1.3600696