Editorial Board
A multiple domain algorithm for modeling one-dimensional transient contaminant transport flows
An efficient binary sequence generator with cryptographic applications
Numerical approximations for solving a time-dependent partial differential equation with non-classical specification on four boundaries
Quasi-implicit and two-level explicit finite-difference procedures for solving the one-dimensional advection equation
A non-homogeneous Hill’s equation
On positive mountain pass solutions for a semilinear elliptic boundary value problem
A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography
Convergence of descent method without line search
Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation
Improving Lamport one-time signature scheme
Evaluation of the derivative of a polynomial in Bernstein form
A new key authentication scheme for cryptosystems based on discrete logarithms
Spline methods for the solution of fourth-order parabolic partial differential equations
On computational solution of vector maximum problem
Oscillation of continuous and discrete diffusive delay Nicholson’s blowflies models
Primal–dual solution for the linear programming problems using neural networks
The effect of the increase of linear dimensions on exponents obtained by finite-size scaling relations for the six-dimensional Ising model on the Creutz cellular automaton
Spline based computational technique for linear singularly perturbed boundary value problems
Computational Quartic c3-spline and Quintic c2-spline algorithms for solving second-order initial value problems
Interval weight generation approaches based on consistency test and interval comparison matrices
Improvement of Fan et al.’s deniable authentication protocol based on Diffie–Hellman algorithm
Security of Hsu–Wu’s authenticated encryption scheme with (t, n) shared verification
Least squares fitting Gaussian type curve
Covariance matrix estimation using repeated measurements when data are incomplete
An iterative method for solving dual fuzzy nonlinear equations
Positive periodic solutions of discrete n-species food-chain systems
A numerical analysis of a model of growth tumor
Efficient nonce-based remote user authentication scheme using smart cards
An efficient threshold group signature scheme
Numerical analysis of a singular integral equation
Option valuation by using discrete singular convolution
Model-based data assessment for terrestrial carbon processes: implications for sampling strategy in FACE experiments
An efficient method to compute singularity induced bifurcations of decoupled parameter-dependent differential-algebraic power system model
Bifurcation analysis of delayed logistic equation
Management of surgical waiting lists through a Possibilistic Linear Multiobjective Programming problem
A simulated annealing applied for optimizing a voice-multihop radio network
Fractional programming with absolute-value functions: a fuzzy goal programming approach
Flexible management of water resource systems
Analysis of insulin sensitivity estimates from linear models of glucose disappearance
A fuzzy vector quantization approach to image compression
An approximate solution of a nonlinear fractional differential equation by Adomian decomposition method
Remarks on a new key authentication scheme based on discrete logarithms
Review of model order reduction methods for numerical simulation of nonlinear circuits
ESSs in n-player mixed games
The exact solutions of a kind of nonlinear operator equations
On multiobjective optimization in portfolio management
Applying the double side method of weighted residual to the solution of shell deformation problem
Dykstra’s algorithm with strategies for projecting onto certain polyhedral cones
Mortar method for nonconforming finite elements
On determinants of matrices with general Fibonacci numbers entries
A filter method for solving nonlinear complementarity problems
Computation of abstract groups S((d + 1)/2,d) and torus knots K(d, 2)
Improvement of Chien–Jan’s authenticated multiple-key agreement protocol without using conventional one-way function
An efficient algorithm for the Euclidean r-centrum location problem
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes