Publication | Date of Publication | Type |
---|
Evaluation of water quality reliability based on entropy in water distribution system | 2022-03-01 | Paper |
Using high-dimensional features for high-accuracy pulse diagnosis | 2021-09-03 | Paper |
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps | 2019-08-14 | Paper |
Certificateless Proxy Signature Scheme in the Standard Model | 2018-10-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4610080 | 2018-04-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448131 | 2015-10-28 | Paper |
Improvement on Meshram et al.'s ID-based cryptographic mechanism | 2014-04-14 | Paper |
Directed proxy signature in the standard model | 2014-03-27 | Paper |
Quantile Hedging for Guaranteed Minimum Death Benefits with Regime Switching | 2012-11-09 | Paper |
Quantile hedging for guaranteed minimum death benefits | 2012-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3016683 | 2011-07-19 | Paper |
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation | 2011-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3404806 | 2010-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3406309 | 2010-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3641930 | 2009-11-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3609397 | 2009-03-06 | Paper |
A chaos-based image encryption algorithm using alternate structure | 2007-10-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5307855 | 2007-09-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3596028 | 2007-08-29 | Paper |
A new forward-secure authenticated encryption scheme with message linkages | 2007-06-01 | Paper |
An efficient and secure multi-secret sharing scheme with general access structures | 2007-06-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3429782 | 2007-03-20 | Paper |
Exploiting randomness on continuous sets | 2007-02-16 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3420704 | 2007-02-02 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information Security | 2006-10-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5468150 | 2006-05-24 | Paper |
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences | 2006-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5715556 | 2006-01-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5715557 | 2006-01-03 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
An improved signature scheme without using one-way hash functions | 2005-11-22 | Paper |
Security analysis and improvement of a double-trapdoor encryption scheme | 2005-11-16 | Paper |
A research on new public-key encryption schemes | 2005-11-16 | Paper |
On the security of a convertible authenticated encryption | 2005-11-14 | Paper |
Two provably secure \(k\)-out-of-\(n\) oblivious transfer schemes | 2005-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700990 | 2005-11-02 | Paper |
A \(w\)-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography | 2005-10-28 | Paper |
A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing | 2005-10-28 | Paper |
On the security of Miyaji et al. group signature scheme | 2005-10-28 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5311612 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4662946 | 2005-03-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4656403 | 2005-03-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823845 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4825258 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473569 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473574 | 2004-08-04 | Paper |
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield | 2004-07-01 | Paper |
Secure Web transaction with anonymous mobile agent over Internet | 2003-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502637 | 2002-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4519672 | 2001-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4489383 | 2000-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4878059 | 1997-06-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4872228 | 1997-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4879601 | 1996-06-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3752708 | 1986-01-01 | Paper |