Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
A constructive algorithm for the completion of arbitrary algebraic partial differential equation systems to involutive ones are presented. Based on it, an implementation ICS for c...
This paper considers a basic model for a spread of two diseases in a population. The equilibria of the model are found, and their stability is investigated. In particular, we prov...
Preconditioned iterative methods are described for the solution of an elliptic partial differential equation over an unit square region with Robbins boundary conditions. Transform...
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...