Security analysis and improvement of a user-friendly remote authentication protocol Fulltext Access 4 Pages 2005
Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function Fulltext Access 4 Pages 2005
On computing of arbitrary positive integer powers for one type of tridiagonal matrices Fulltext Access 4 Pages 2005
Comments on “Asymptotic expansion of a Bessel function integral using hypergeometric functions” by L.J. Landau and N.J. Luswili Fulltext Access 4 Pages 2005
Initial value problem with infinitely many linear-like solutions for a second-order differential equation Fulltext Access 4 Pages 2005
Numerical solution of an inverse problem of gravimetry for a contact surface Fulltext Access 4 Pages 2005
Nonexistence of solutions for reverse radial stagnation flow with transpiration Fulltext Access 4 Pages 2005
Review of Selected Papers of Alan Hoffman with Commentary, edited by Charles Micchelli, World Scientific, Singapore, xliv + 446 pages Fulltext Access 4 Pages 2005
An asymptotic expansion for the error in a linear map that reproduces polynomials of a certain order Fulltext Access 4 Pages 2005
A counterexample for the global separation principle for discrete-time nonlinear systems Fulltext Access 4 Pages 2005
On pulse vaccination strategy in the SIR epidemic model with vertical transmission Fulltext Access 4 Pages 2005
Norm estimates of the Fourier series coefficients of the matrix resolvent Fulltext Access 5 Pages 2005
New travelling wave solutions for the Fisher-KPP equation with general exponents Fulltext Access 5 Pages 2005
On the global asymptotic stability of the difference equation xn=xn-1xn-2+xn-3+axn-1+xn-2xn-3+a Fulltext Access 5 Pages 2005
Explicit solutions of the generalized KdV equations with higher order nonlinearity Fulltext Access 5 Pages 2005
Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response Fulltext Access 5 Pages 2005
Idempotency of linear combinations of an idempotent matrix and a t-potent matrix that commute Fulltext Access 5 Pages 2005
BelitskiÄ's canonical form for 5Â ÃÂ 5 upper triangular matrices under upper triangular similarity Fulltext Access 5 Pages 2005
A composite third order Newton-Steffensen method for solving nonlinear equations Fulltext Access 5 Pages 2005
Stabilization of some nonlinear controlled electrohydraulic servosystems Fulltext Access 5 Pages 2005
Uniqueness implies existence for three-point boundary value problems for second order differential equations Fulltext Access 5 Pages 2005
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol Fulltext Access 5 Pages 2005
A suggested approach for possibility and necessity dominance indices in stochastic fuzzy linear programming Fulltext Access 5 Pages 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys Fulltext Access 5 Pages 2005
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function Fulltext Access 5 Pages 2005
Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification Fulltext Access 5 Pages 2005
On positive mountain pass solutions for a semilinear elliptic boundary value problem Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I Fulltext Access 5 Pages 2005
Comment on traceability on RSA-based partially signature with low computation Fulltext Access 5 Pages 2005