| Publication | Date of Publication | Type |
|---|
Optimal VIX-linked structure for the target benefit pension plan ASTIN Bulletin | 2024-04-30 | Paper |
Evaluation of water quality reliability based on entropy in water distribution system Physica A | 2022-03-01 | Paper |
Using high-dimensional features for high-accuracy pulse diagnosis Mathematical Biosciences and Engineering | 2021-09-03 | Paper |
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps Journal of Applied Mathematics and Computing | 2019-08-14 | Paper |
Certificateless proxy signature scheme in the Standard Model Fundamenta Informaticae | 2018-10-26 | Paper |
nMIBAS: a novel multi-receiver ID-based anomymous signcryption with decryption fairness | 2018-04-05 | Paper |
scientific article; zbMATH DE number 6499890 (Why is no real title available?) | 2015-10-28 | Paper |
Improvement on Meshram et al.'s ID-based cryptographic mechanism Information Processing Letters | 2014-04-14 | Paper |
Directed proxy signature in the standard model Journal of Shanghai Jiaotong University (Science) | 2014-03-27 | Paper |
Quantile hedging for guaranteed minimum death benefits with regime switching Stochastic Analysis and Applications | 2012-11-09 | Paper |
Quantile hedging for guaranteed minimum death benefits Insurance Mathematics & Economics | 2012-02-10 | Paper |
An ID-based chameleon hash scheme and signature without key escrow | 2011-07-19 | Paper |
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation Journal of Computational and Applied Mathematics | 2011-03-09 | Paper |
An identity (ID)-based threshold multi-secret sharing scheme | 2010-02-12 | Paper |
A new ID-based identification scheme | 2010-02-12 | Paper |
A verifiable threshold multi-secret sharing scheme | 2009-11-11 | Paper |
RSA cryptosystem in the domain \(Z[\omega\)] | 2009-03-06 | Paper |
A chaos-based image encryption algorithm using alternate structure Science in China. Series F | 2007-10-12 | Paper |
Provably secure convertible user designating confirmer partially blind signatures | 2007-09-18 | Paper |
scientific article; zbMATH DE number 5184351 (Why is no real title available?) | 2007-08-29 | Paper |
An efficient and secure multi-secret sharing scheme with general access structures Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
A new forward-secure authenticated encryption scheme with message linkages Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Existence of nontrivial antiperiodic solutions for nonlinear second order difference equations | 2007-03-20 | Paper |
Exploiting randomness on continuous sets Information Sciences | 2007-02-16 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Calculating formulas and convergence of roots for equation of 5th order | 2007-02-02 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
A method for the efficient computation of scalar multiplication in Koblitz curve | 2006-05-24 | Paper |
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences Applied Mathematics and Computation | 2006-05-18 | Paper |
scientific article; zbMATH DE number 2243081 (Why is no real title available?) | 2006-01-03 | Paper |
scientific article; zbMATH DE number 2243084 (Why is no real title available?) | 2006-01-03 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
An improved signature scheme without using one-way hash functions Applied Mathematics and Computation | 2005-11-22 | Paper |
Security analysis and improvement of a double-trapdoor encryption scheme Applied Mathematics and Computation | 2005-11-16 | Paper |
A research on new public-key encryption schemes Applied Mathematics and Computation | 2005-11-16 | Paper |
On the security of a convertible authenticated encryption Applied Mathematics and Computation | 2005-11-14 | Paper |
Two provably secure \(k\)-out-of-\(n\) oblivious transfer schemes Applied Mathematics and Computation | 2005-11-14 | Paper |
scientific article; zbMATH DE number 2222195 (Why is no real title available?) | 2005-11-02 | Paper |
On the security of Miyaji et al. group signature scheme Applied Mathematics and Computation | 2005-10-28 | Paper |
A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing Applied Mathematics and Computation | 2005-10-28 | Paper |
A \(w\)-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography Applied Mathematics and Computation | 2005-10-28 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
scientific article; zbMATH DE number 2197692 (Why is no real title available?) | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2150387 (Why is no real title available?) | 2005-03-30 | Paper |
scientific article; zbMATH DE number 2144118 (Why is no real title available?) | 2005-03-11 | Paper |
scientific article; zbMATH DE number 2111173 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2112355 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2080678 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2080673 (Why is no real title available?) | 2004-08-04 | Paper |
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield Journal of Computer Science and Technology | 2004-07-01 | Paper |
Secure Web transaction with anonymous mobile agent over Internet Journal of Computer Science and Technology | 2003-08-13 | Paper |
scientific article; zbMATH DE number 1504674 (Why is no real title available?) | 2002-07-16 | Paper |
scientific article; zbMATH DE number 1539486 (Why is no real title available?) | 2001-01-07 | Paper |
scientific article; zbMATH DE number 1474817 (Why is no real title available?) | 2000-07-11 | Paper |
scientific article; zbMATH DE number 880660 (Why is no real title available?) | 1997-06-23 | Paper |
scientific article; zbMATH DE number 858208 (Why is no real title available?) | 1997-02-16 | Paper |
scientific article; zbMATH DE number 883164 (Why is no real title available?) | 1996-06-02 | Paper |
scientific article; zbMATH DE number 3989812 (Why is no real title available?) | 1986-01-01 | Paper |