Search Results

There are 7800 results for: content related to: PHANtom: a modern aspect language for Pharo Smalltalk

  1. An Algebra for Spatiotemporal Data: From Observations to Events

    Transactions in GIS

    Volume 18, Issue 2, April 2014, Pages: 253–269, Karine Reis Ferreira, Gilberto Camara and Antônio Miguel Vieira Monteiro

    Article first published online : 22 MAY 2013, DOI: 10.1111/tgis.12030

  2. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  3. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  4. C-strider: type-aware heap traversal for C

    Software: Practice and Experience

    Volume 46, Issue 6, June 2016, Pages: 767–788, Karla Saur, Michael Hicks and Jeffrey S. Foster

    Article first published online : 14 MAY 2015, DOI: 10.1002/spe.2332

  5. LOGICAL RELATIONS

    Philosophical Perspectives

    Volume 27, Issue 1, December 2013, Pages: 175–230, Lloyd Humberstone

    Article first published online : 29 DEC 2013, DOI: 10.1111/phpe.12021

  6. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Article first published online : 28 JUN 2013, DOI: 10.1002/sec.820

  7. Mastering crosscutting architectural decisions with aspects

    Software: Practice and Experience

    Volume 43, Issue 3, March 2013, Pages: 305–332, Claudio Sant'Anna, Alessandro Garcia, Thais Batista and Awais Rashid

    Article first published online : 26 FEB 2012, DOI: 10.1002/spe.2113

  8. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1193

  9. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  10. Existence and uniqueness of solutions for the magnetohydrodynamic flow of a second grade fluid

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 4, 15 March 2013, Pages: 478–496, K. Hamdache and B. Jaffal-Mourtada

    Article first published online : 21 JUN 2012, DOI: 10.1002/mma.2608

  11. Analysis of cosmic microwave background data on an incomplete sky

    Monthly Notices of the Royal Astronomical Society

    Volume 330, Issue 2, February 2002, Pages: 405–420, Daniel J. Mortlock, Anthony D. Challinor and Michael P. Hobson

    Article first published online : 4 APR 2002, DOI: 10.1046/j.1365-8711.2002.05085.x

  12. A suite of abstract domains for static analysis of string values

    Software: Practice and Experience

    Volume 45, Issue 2, February 2015, Pages: 245–287, Giulia Costantini, Pietro Ferrara and Agostino Cortesi

    Article first published online : 16 AUG 2013, DOI: 10.1002/spe.2218

  13. A generic static analyzer for multithreaded Java programs

    Software: Practice and Experience

    Volume 43, Issue 6, June 2013, Pages: 663–684, P. Ferrara

    Article first published online : 9 MAY 2012, DOI: 10.1002/spe.2126

  14. A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1034

  15. Some theoretical considerations on predictability of linear stochastic dynamics

    Tellus A

    Volume 55, Issue 2, March 2003, Pages: 148–157, MICHAEL K. TIPPETT and PING CHANG

    Article first published online : 14 FEB 2003, DOI: 10.1034/j.1600-0870.2003.00008.x

  16. Bayesian reconstruction of the cosmological large-scale structure: methodology, inverse algorithms and numerical optimization

    Monthly Notices of the Royal Astronomical Society

    Volume 389, Issue 2, September 2008, Pages: 497–544, F. S. Kitaura and T. A. Enßlin

    Article first published online : 15 AUG 2008, DOI: 10.1111/j.1365-2966.2008.13341.x

  17. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1219–1231, Chen Yuan and Dong Qingkuan

    Article first published online : 1 SEP 2013, DOI: 10.1002/sec.853

  18. Execution profiling blueprints

    Software: Practice and Experience

    Volume 42, Issue 9, September 2012, Pages: 1165–1192, Alexandre Bergel, Felipe Bañados, Romain Robbes and Walter Binder

    Article first published online : 15 SEP 2011, DOI: 10.1002/spe.1120

  19. Further improvement of a certificateless signature scheme without pairing

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 2083–2091, Peng Gong and Ping Li

    Article first published online : 22 OCT 2012, DOI: 10.1002/dac.2457

  20. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002