Search Results

There are 13673 results for: content related to: Generating signatures with optimal overhead: practical paddings for signature schemes

  1. You have full text access to this Open Access content
    n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  2. You have full text access to this Open Access content
    Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  3. You have full text access to this Open Access content
    Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1805–1814, Baocang Wang, Yupu Hu and Xixiang Lv

    Version of Record online : 8 NOV 2013, DOI: 10.1002/sec.881

  4. You have full text access to this Open Access content
    Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  5. You have full text access to this Open Access content
    PPGJ: A privacy-preserving general join for outsourced encrypted database

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1232–1244, Sha Ma, Bo Yang and Mingwu Zhang

    Version of Record online : 24 OCT 2013, DOI: 10.1002/sec.854

  6. Multi-equilibrium property of metabolic networks: MMN module

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 10, 10 July 2014, Pages: 1505–1529, Jin Guo, Ji-Feng Zhang and Yanlong Zhao

    Version of Record online : 20 DEC 2012, DOI: 10.1002/rnc.2945

  7. You have full text access to this Open Access content
    Efficient public key encryption with revocable keyword search

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 466–472, Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu and Willy Susilo

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.790

  8. The applications of Saddle point theorem to Dirichlet boundary value problem of differential system

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 16, 15 November 2014, Pages: 2562–2569, Weigao Ge and Yu Tian

    Version of Record online : 11 MAR 2014, DOI: 10.1002/mma.2997

  9. You have full text access to this Open Access content
    Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  10. You have full text access to this Open Access content
    Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  11. On the asymptotic behavior of a linear viscoelastic fluid

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 7, 15 May 2012, Pages: 769–775, Mauro Fabrizio, Barbara Lazzari and Roberta Nibbi

    Version of Record online : 10 APR 2012, DOI: 10.1002/mma.1602

  12. You have full text access to this Open Access content
    A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  13. A complete upper estimate on the localization for the degenerate parabolic equation with nonlinear source

    Mathematical Methods in the Applied Sciences

    Volume 38, Issue 4, 15 March 2015, Pages: 630–635, Pan Zheng and Chunlai Mu

    Version of Record online : 7 FEB 2014, DOI: 10.1002/mma.3094

  14. On the linear complexity of generalized cyclotomic binary sequences of length 2pq

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1520–1530, Zu-Ling Chang and Dandan Li

    Version of Record online : 31 MAY 2013, DOI: 10.1002/cpe.3052

  15. The free boundary problem of American butterfly option

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 1, 15 January 2014, Pages: 48–55, Chonghu Guan and Fahuai Yi

    Version of Record online : 5 JUN 2013, DOI: 10.1002/mma.2784

  16. You have full text access to this Open Access content
    One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  17. Oscillation criteria of a class of fourth order differential equations

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 3, February 2012, Pages: 350–359, Maozhu Zhang, Jiong Sun and Jijun Ao

    Version of Record online : 30 DEC 2011, DOI: 10.1002/mma.1583

  18. Higher-order generalized invexity in variational problems

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 11, 30 July 2013, Pages: 1334–1341, S.K. Padhan and C. Nahak

    Version of Record online : 12 SEP 2012, DOI: 10.1002/mma.2685

  19. On an inverse scattering problem for a class Dirac operator with discontinuous coefficient and nonlinear dependence on the spectral parameter in the boundary condition

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 14, 30 September 2012, Pages: 1712–1720, Kh.R. Mamedov and Aynur Çöl

    Version of Record online : 20 JUN 2012, DOI: 10.1002/mma.2553

  20. Blow-up criteria of smooth solutions to the 3D Boussinesq equations

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 3, February 2012, Pages: 278–285, Yuming Qin, Xinguang Yang, Yu-Zhu Wang and Xin Liu

    Version of Record online : 29 DEC 2011, DOI: 10.1002/mma.1558