Search Results

There are 12559 results for: content related to: Do Extrinsic Dispositions Need Extrinsic Causal Bases?

  1. INTER-PARTY COMPETITION, POLITICAL DIALOGUE, AND PUBLIC POLICY: A CRITICAL REVIEW

    Policy Studies Journal

    Volume 16, Issue 2, December 1987, Pages: 243–262, Jeffrey M. Stonecash

    Version of Record online : 9 SEP 2005, DOI: 10.1111/j.1541-0072.1987.tb00778.x

  2. Secure broadcast in distributed networks with strong adversaries

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3739–3750, Pawel Szalachowski and Tiffany Hyun-Jin Kim

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1296

  3. Towards an efficient reputation based hybrid key management architecture for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 2-3, March - June 2010, Pages: 261–277, Lamia Benazzouz, Mohamed Elhoucine Elhdhili and Farouk Kamoun

    Version of Record online : 31 JUL 2009, DOI: 10.1002/sec.130

  4. Kap. V.: Die Körperlänge der unbemittelten Klassen in Stockholm.

    Nordiskt Medicinskt Arkiv

    Volume 42, Issue 8, January/December 1909, Pages: 65–79,

    Version of Record online : 24 APR 2009, DOI: 10.1111/j.0954-6820.1909.tb00062.x

  5. An access control scheme with dynamic user management and cloud-aided decryption

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5659–5672, Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He and Xieyang Shen

    Version of Record online : 24 JAN 2017, DOI: 10.1002/sec.1725

  6. Distributed key generation protocol with a new complaint management strategy

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4585–4595, Wafa Neji, Kaouther Blibech and Narjes Ben Rajeb

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1651

  7. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1340–1352, Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Version of Record online : 26 JAN 2016, DOI: 10.1002/sec.1420

  8. Further analysis of pairing-based traitor tracing schemes for broadcast encryption

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 28–32, Tsu-Yang Wu and Yuh-Min Tseng

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.522

  9. Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment

    Transactions on Emerging Telecommunications Technologies

    Preeti Chandrakar and Hari Om

    Version of Record online : 25 MAY 2017, DOI: 10.1002/ett.3200

  10. Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1321–1330, Yanrong Lu, Lixiang Li, Haipeng Peng and Yixian Yang

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1417

  11. Meanings of Songs and Meanings of Song Performances

    The Journal of Aesthetics and Art Criticism

    Volume 71, Issue 1, February 2013, Pages: 23–33, Theodore Gracyk

    Version of Record online : 4 FEB 2013, DOI: 10.1111/j.1540-6245.2012.01538.x

  12. Certificateless and certificate-based signatures from lattices

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1575–1586, Miaomiao Tian and Liusheng Huang

    Version of Record online : 27 OCT 2014, DOI: 10.1002/sec.1105

  13. Height and Weight of Schoolboys at a Stockholm Secondary School, 1950, and a Comparison with Some Earlier Investigations

    Acta Paediatrica

    Volume 43, Issue 3, May 1954, Pages: 235–246, ERNST ABRAMSON and EVA ERNEST

    Version of Record online : 21 JAN 2008, DOI: 10.1111/j.1651-2227.1954.tb04022.x

  14. The Spatial and Demographic Determinants of Racial Threat

    Social Science Quarterly

    Volume 95, Issue 4, December 2014, Pages: 1137–1154, Joshua N. Zingher and M. Steen Thomas

    Version of Record online : 21 APR 2014, DOI: 10.1111/ssqu.12095

  15. Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4574–4584, Yahong Li, Caifen Wang, Yulei Zhang and Shufen Niu

    Version of Record online : 27 OCT 2016, DOI: 10.1002/sec.1650

  16. You have free access to this content
    Stakeholders' Beliefs About the TOEFL iBT® Test as a Measure of Academic Language Ability

    ETS Research Report Series

    Volume 2014, Issue 2, December 2014, Pages: 1–51, Margaret E. Malone and Megan Montee

    Version of Record online : 17 DEC 2014, DOI: 10.1002/ets2.12039

  17. CCA2 secure public-key encryption scheme tolerating continual leakage attacks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4505–4519, YanWei Zhou, Bo Yang, Wenzheng Zhang and Yi Mu

    Version of Record online : 19 OCT 2016, DOI: 10.1002/sec.1643

  18. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3670–3687, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  19. Radicalizing electoral system effects on support for nationalist hardliners in Serbia

    Nations and Nationalism

    Volume 19, Issue 1, January 2013, Pages: 21–43, Daniel Bochsler

    Version of Record online : 13 NOV 2012, DOI: 10.1111/j.1469-8129.2012.00558.x

  20. Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 2981–2991, Hongfeng Zhu

    Version of Record online : 10 FEB 2015, DOI: 10.1002/sec.1225