On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices-I Fulltext Access 5 Pages 2005
A new blind signature based on the discrete logarithm problem for untraceability Fulltext Access 5 Pages 2005
On the unlinkability of randomization-enhanced Chaum's blind signature scheme Fulltext Access 5 Pages 2005
Preliminary test estimation in the two parameter exponential distribution with time censored data Fulltext Access 5 Pages 2005
Numerical implementation of Adomian decomposition method for linear Volterra integral equations of the second kind Fulltext Access 5 Pages 2005
Maximum probability/entropy translating of contiguous categorical observations into frequencies Fulltext Access 5 Pages 2005
A modified formula of ancient Chinese algorithm by the homotopy continuation technique Fulltext Access 5 Pages 2005
On the traceability on RSA-based partially signature with low computation Fulltext Access 5 Pages 2005
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order Fulltext Access 5 Pages 2005
Five-point boundary value problems for third-order differential equations by solution matching Fulltext Access 5 Pages 2005
Statistical cellular Gaussian scatter density channel model employing a directional antenna for mobile environments Fulltext Access 5 Pages 2005
Explicit solutions of the generalized KdV equations with higher order nonlinearity Fulltext Access 5 Pages 2005
Note on starting the Numerov method more accurately by a hybrid formula of order four for an initial-value problem Fulltext Access 5 Pages 2005
Accelerated convergence in Newton's method for approximating square roots Fulltext Access 5 Pages 2005
Recurrence relations for the even and odd characteristic polynomials of a symmetric Toeplitz matrix Fulltext Access 5 Pages 2005
A new semilocal convergence theorem for Newton's method involving twice Fréchet-differentiability at only one point Fulltext Access 5 Pages 2005
The fundamental group of an oriented surface of genus n with k boundary surfaces Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I Fulltext Access 5 Pages 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys Fulltext Access 5 Pages 2005
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function Fulltext Access 5 Pages 2005
A composite third order Newton-Steffensen method for solving nonlinear equations Fulltext Access 5 Pages 2005
Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification Fulltext Access 5 Pages 2005
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol Fulltext Access 5 Pages 2005
On positive mountain pass solutions for a semilinear elliptic boundary value problem Fulltext Access 5 Pages 2005
Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems Fulltext Access 5 Pages 2005
On the global asymptotic stability of the difference equation xn=xn-1xn-2+xn-3+axn-1+xn-2xn-3+a Fulltext Access 5 Pages 2005
Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response Fulltext Access 5 Pages 2005
Comment on traceability on RSA-based partially signature with low computation Fulltext Access 5 Pages 2005
Level set algorithm for solving convex multiplicative programming problems Fulltext Access 6 Pages 2005
A new approach to the solution of the prey and predator problem and comparison of the results with the Adomian method Fulltext Access 6 Pages 2005
A modified goal programming approach for the mean-absolute deviation portfolio optimization model Fulltext Access 6 Pages 2005
Numerical solution of Fredholm-Volterra integral equation in one dimension with time dependent Fulltext Access 6 Pages 2005
A new computational algorithm for solving periodic tri-diagonal linear systems Fulltext Access 6 Pages 2005
Solving second kind integral equations with hybrid Fourier and block-pulse functions Fulltext Access 6 Pages 2005
Integrating first-order differential equations with Liouvillian solutions via quadratures: a semi-algorithmic method Fulltext Access 6 Pages 2005
Comments on ID-based multi-signature with distinguished signing authorities Fulltext Access 6 Pages 2005
Remarks on some signature schemes based on factoring and discrete logarithms Fulltext Access 6 Pages 2005
A computation method for nonlinear vibration of axially accelerating viscoelastic strings Fulltext Access 6 Pages 2005
A note on determining the number of outliers in a normal sample with unequal variances by least squares procedure Fulltext Access 6 Pages 2005
Finding the piecewise linear frontier production function in data envelopment analysis Fulltext Access 6 Pages 2005
Automatic calculation of the fundamental group of an oriented surface of genus n with k boundary surfaces Fulltext Access 6 Pages 2005
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme Fulltext Access 6 Pages 2005
The solution of two dimensional nonlinear differential equation by the Adomian decomposition method Fulltext Access 6 Pages 2005
An approximation to the solution of hyperbolic equations by Adomian decomposition method and comparison with characteristics method Fulltext Access 6 Pages 2005
The security of a strong proxy signature scheme with proxy signer privacy protection Fulltext Access 6 Pages 2005
Improvement of signature scheme based on factoring and discrete logarithms Fulltext Access 6 Pages 2005
On computing of arbitrary positive integer powers for one type of even order tridiagonal matrices with zero row-I Fulltext Access 6 Pages 2005
Exact solutions of multi-component nonlinear Schrödinger and Klein-Gordon equations Fulltext Access 6 Pages 2005