Sciweavers

AMC
2005
172views more  AMC 2005»
13 years 10 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
AMC
2005
138views more  AMC 2005»
13 years 10 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
AMC
2005
112views more  AMC 2005»
13 years 10 months ago
Mechanization for solving SPP by reducing order method
In this paper, by using the theories and methods of mathematical analysis and computer algebra, a reliable algorithm of reduction of order approximation method for solving singula...
Zhenqing Li, Weiming Wang
AMC
2005
138views more  AMC 2005»
13 years 10 months ago
Optimal centers in branch-and-prune algorithms for univariate global optimization
We present an interval branch-and-prune algorithm for computing verified enclosures for the global minimum and all global minimizers of univariate functions subject to bound const...
D. G. Sotiropoulos, T. N. Grapsa
AMC
2005
168views more  AMC 2005»
13 years 10 months ago
Comparison between the homotopy analysis method and homotopy perturbation method
In this paper, we show that the so-called ``homotopy perturbation method'' is only a special case of the homotopy analysis method. Both methods are in principle based on...
Shijun Liao
AMC
2005
94views more  AMC 2005»
13 years 10 months ago
Non-negative solutions of ODEs
Lawrence F. Shampine, Skip Thompson, Jacek Kierzen...
AMC
2005
256views more  AMC 2005»
13 years 10 months ago
Improved DSA variant for batch verification
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the com...
Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn
AMC
2005
78views more  AMC 2005»
13 years 10 months ago
One-to-one mapping matrix
Tzong-Mou Wu
AMC
2005
87views more  AMC 2005»
13 years 10 months ago
The distribution models of grazing animals between two grassland resource points
In this paper, by using theories of stochastic process and differential equation, the authors systematically studied the distribution of grazing animals between two resource point...
Weiming Wang, Zhenqing Li
AMC
2005
95views more  AMC 2005»
13 years 10 months ago
Detection and continuation of a border collision bifurcation in a forest fire model
The behavior of the simplest forest fire model is studied in this paper through bifurcation analysis. The model is a second-order continuous-time impact model where vegetational g...
Fabio Dercole, Stefano Maggi