Sciweavers

AMC
2005
218views more  AMC 2005»
13 years 11 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
AMC
2005
104views more  AMC 2005»
13 years 11 months ago
Properties and computations of matrix pseudospectra
Yuming Shen, Jinxi Zhao, Hongjun Fan
AMC
2005
119views more  AMC 2005»
13 years 11 months ago
A diffuse-interface model for axisymmetric immiscible two-phase flow
A diffuse-interface model is considered for solving axisymmetric immiscible twophase flow with surface tension. The Navier
Junseok Kim
AMC
2005
120views more  AMC 2005»
13 years 11 months ago
ICS: a package for computing involutive characteristic set of algebraic partial differential equation systems
A constructive algorithm for the completion of arbitrary algebraic partial differential equation systems to involutive ones are presented. Based on it, an implementation ICS for c...
Shan-Qing Zhang, Gui-Xu Zhang, Zhi-Bin Li
AMC
2005
112views more  AMC 2005»
13 years 11 months ago
On a basic model of a two-disease epidemic
This paper considers a basic model for a spread of two diseases in a population. The equilibria of the model are found, and their stability is investigated. In particular, we prov...
Konstantin B. Blyuss, Yuliya N. Kyrychko
AMC
2005
103views more  AMC 2005»
13 years 11 months ago
Bivariate polynomial interpolation on the square at new nodal sets
Marco Caliari, Stefano De Marchi, Marco Vianello
AMC
2005
123views more  AMC 2005»
13 years 11 months ago
Iterative methods for Robbins problems
Preconditioned iterative methods are described for the solution of an elliptic partial differential equation over an unit square region with Robbins boundary conditions. Transform...
Andy C. Ho, Michael K. Ng
AMC
2005
124views more  AMC 2005»
13 years 11 months ago
An efficient undeniable group-oriented signature scheme
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen
AMC
2005
116views more  AMC 2005»
13 years 11 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
AMC
2005
88views more  AMC 2005»
13 years 11 months ago
A two level finite difference scheme for one dimensional Pennes' bioheat equation
Jennifer J. Zhao, Jun Zhang, Ning Kang, Fuqian Yan...