Sciweavers

77 search results - page 13 / 16
» amc 2005
Sort
View
AMC
2005
168views more  AMC 2005»
13 years 10 months ago
Comparison between the homotopy analysis method and homotopy perturbation method
In this paper, we show that the so-called ``homotopy perturbation method'' is only a special case of the homotopy analysis method. Both methods are in principle based on...
Shijun Liao
AMC
2005
150views more  AMC 2005»
13 years 10 months ago
High order fitted operator numerical method for self-adjoint singular perturbation problems
We consider self-adjoint singularly perturbed two-point boundary value problems in conservation form. Highest possible order of uniform convergence for such problems achieved hith...
Kailash C. Patidar
AMC
2005
158views more  AMC 2005»
13 years 10 months ago
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
At the fourth ACM conference on electronic commerce (EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is a...
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
AMC
2005
143views more  AMC 2005»
13 years 10 months ago
Investment with restricted stock and the value of information
In most public companies in China, there are two thirds of shares that cannot be traded freely in the secondary market. These illiquid shares, however, may be allowed to circulate...
Weixing Wu, Yongxiang Wang
AMC
2005
154views more  AMC 2005»
13 years 10 months ago
An improvement of the Yang-Shieh password authentication schemes
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...
Chou Chen Yang, Ren-Chiun Wang, Ting Yi Chang