In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
In this paper, by using the theories and methods of mathematical analysis and computer algebra, a reliable algorithm of reduction of order approximation method for solving singula...
We present an interval branch-and-prune algorithm for computing verified enclosures for the global minimum and all global minimizers of univariate functions subject to bound const...
In this paper, we show that the so-called ``homotopy perturbation method'' is only a special case of the homotopy analysis method. Both methods are in principle based on...
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the com...
In this paper, by using theories of stochastic process and differential equation, the authors systematically studied the distribution of grazing animals between two resource point...
The behavior of the simplest forest fire model is studied in this paper through bifurcation analysis. The model is a second-order continuous-time impact model where vegetational g...