Search Results

There are 30316 results for: content related to: SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games

  1. Direct computation of current density to solve 3D electric conduction problems using facet elements with FEM

    International Journal of Numerical Modelling: Electronic Networks, Devices and Fields

    Volume 27, Issue 3, May/June 2014, Pages: 400–417, Pauline Ferrouillat, Christophe Guérin, Gérard Meunier, Brahim Ramdane and Anthony Carpentier

    Version of Record online : 17 DEC 2013, DOI: 10.1002/jnm.1952

  2. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  3. Secure and privacy-preserving pattern matching in outsourced computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3444–3451, Dongmei Li, Xiaolei Dong and Zhenfu Cao

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1552

  4. Shock waves for the hyperbolic balance laws with discontinuous sources

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 14, 30 September 2014, Pages: 2029–2064, Pingfan Tang and Ya-Guang Wang

    Version of Record online : 12 AUG 2013, DOI: 10.1002/mma.2952

  5. Adaptive back-stepping sliding mode attitude control of missile systems

    International Journal of Robust and Nonlinear Control

    Volume 23, Issue 15, October 2013, Pages: 1699–1717, Yuanqing Xia, Kunfeng Lu, Zheng Zhu and Mengyin Fu

    Version of Record online : 3 JAN 2013, DOI: 10.1002/rnc.2952

  6. Power/sample size calculations for assessing correlates of risk in clinical efficacy trials

    Statistics in Medicine

    Volume 35, Issue 21, 20 September 2016, Pages: 3745–3759, Peter B. Gilbert, Holly E. Janes and Yunda Huang

    Version of Record online : 31 MAR 2016, DOI: 10.1002/sim.6952

  7. Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1974–1987, Mingwu Zhang, Bo Yang, Chunzhi Wang and Tsuyoshi Takagi

    Version of Record online : 18 NOV 2013, DOI: 10.1002/sec.912

  8. Efficient identity-based broadcast signcryption schemes

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 914–925, Intae Kim and Seong Oun Hwang

    Version of Record online : 12 JUL 2013, DOI: 10.1002/sec.802

  9. A New Finite Time Convergence Condition for Super-Twisting Observer Based on Lyapunov Analysis

    Asian Journal of Control

    Volume 17, Issue 3, May 2015, Pages: 1050–1060, Chaoxu Mu and Changyin Sun

    Version of Record online : 22 AUG 2014, DOI: 10.1002/asjc.952

  10. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  11. Optimal random replacement models with continuously processing jobs

    Applied Stochastic Models in Business and Industry

    Volume 29, Issue 2, March/April 2013, Pages: 118–126, Mingchih Chen

    Version of Record online : 27 MAR 2012, DOI: 10.1002/asmb.952

  12. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  13. Design considerations for case series models with exposure onset measurement error

    Statistics in Medicine

    Volume 32, Issue 5, 28 February 2013, Pages: 772–786, Sandra M. Mohammed, Lorien S. Dalrymple, Damla Şentürk and Danh V. Nguyen

    Version of Record online : 22 AUG 2012, DOI: 10.1002/sim.5552

  14. Multi-scale model updating of a transmission tower structure using Kriging meta-method

    Structural Control and Health Monitoring

    F.Y. Wang, Y.L. Xu and S. Zhan

    Version of Record online : 9 OCT 2016, DOI: 10.1002/stc.1952

  15. A multi-stage ‘infection’ model of stock investors' reaction to new product announcement signal

    Mathematical Methods in the Applied Sciences

    Volume 39, Issue 18, December 2016, Pages: 5670–5681, Fanhao Hao and Tienan Wang

    Version of Record online : 23 JUN 2016, DOI: 10.1002/mma.3952

  16. Preserving identity privacy on multi-owner cloud data during public verification

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2104–2113, Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.922

  17. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  18. Concordance measures in shared frailty models: application to clustered data in cancer prognosis

    Statistics in Medicine

    Volume 32, Issue 27, 30 November 2013, Pages: 4803–4820, Audrey Mauguen, Sandra Collette, Jean-Pierre Pignon and Virginie Rondeau

    Version of Record online : 3 JUN 2013, DOI: 10.1002/sim.5852

  19. Several variants of the Hermitian and skew-Hermitian splitting method for a class of complex symmetric linear systems

    Numerical Linear Algebra with Applications

    Volume 22, Issue 2, March 2015, Pages: 338–356, Shi-Liang Wu

    Version of Record online : 9 SEP 2014, DOI: 10.1002/nla.1952

  20. Reduction of downlink delay time for heterogeneous users in Fi-Wi indoor networks

    Transactions on Emerging Telecommunications Technologies

    D. DebBarma

    Version of Record online : 7 JUN 2015, DOI: 10.1002/ett.2952