- Eun-Jun Yoon, Kee-Young Yoo:
**On the security of Wu-Lin's robust key authentication scheme.**1-7

- Naimin Zhang, Yimin Wei:
**A note on solving EP inconsistent linear systems.**8-15

- Tofigh Allahviranloo, T. Hajari:
**Numerical methods for approximation of fuzzy data.**16-33

- B. Asady, Saeid Abbasbandy, M. Alavi:
**Fuzzy general linear systems.**34-40

- Zhengtao Jiang, Xi Sun, Yumin Wang:
**Security analysis and improvement of a double-trapdoor encryption scheme.**41-50

- Zhengtao Jiang, Mingsen Xiang, Yumin Wang:
**A research on new public-key encryption schemes.**51-61

- Kyungah Shim, Young-Ran Lee:
**Security flaws in authentication and key establishment protocols for mobile communications.**62-74

- Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
**Improved DSA variant for batch verification.**75-81

- N.-Y. Ma, R. P. King:
**Fitting distribution-like data to exponential sums with genetic algorithms.**82-95

- Hiroyuki Kano, Hiroaki Nakata, Clyde F. Martin:
**Optimal curve fitting and smoothing using normalized uniform B-splines: a tool for studying complex systems.**96-128

- Wenxing Zhu:
**A class of filled functions for box constrained continuous global optimization.**129-145

- Turabi Geyikli, Dogan Kaya:
**Comparison of the solutions obtained by B-spline FEM and ADM of KdV equation.**146-156

- Zhizhang Shen:
**The impact of the apex node on routing inside a pyramid structure.**157-178

- Ling Zhu:
**On the convergent condition of Durand-Kerner method in parallel circular iteration of multi-step.**179-191

- Je Hong Park, Bo Gyeong Kang, Jae Woo Han:
**Cryptanalysis of Zhou et al.'s proxy-protected signature schemes.**192-197

- Wann-Yih Wu, Shuo-Pei Chen:
**A prediction method using the grey model GMC(1, n) combined with the grey relational analysis: a case study on Internet access population forecast.**198-217

- Abdelouahed Hamdi:
**Decomposition for structured convex programs with smooth multiplier methods.**218-241

- J. R. Sharma:
**A composite third order Newton-Steffensen method for solving nonlinear equations.**242-246

- D. G. Sotiropoulos, T. N. Grapsa:
**Optimal centers in branch-and-prune algorithms for univariate global optimization.**247-277

- Qi-min Zhang, Chong-zhao Han:
**Numerical analysis for stochastic age-dependent population equations.**278-294

- Eun-Jun Yoon, Kee-Young Yoo:
**Weakness and solution of Yang et al.'s protected password changing scheme.**295-304

- Bing Liu, Lansun Chen, Yujuan Zhang:
**The dynamics of a prey-dependent consumption model concerning impulsive control strategy.**305-320

- Abdul-Majid Wazwaz:
**The tanh method for generalized forms of nonlinear heat conduction and Burgers-Fisher equations.**321-338

- Gülten Torun, Ibrahim Ethem Anar:
**The electromagnetic scattering problem: the case of TE polarized waves.**339-354

- Qiang Sun:
**Solving the Klein-Gordon equation by means of the homotopy analysis method.**355-365

- Y. C. Chen, L. Y. Tsai:
**Blow-up solutions of nonlinear differential equations.**366-387

- Xinzhen Zhang, Fengming Ma, Yiju Wang:
**A Newton-type algorithm for generalized linear complementarity problem over a polyhedral cone.**388-401

- Yonggui Zhu, Qianshun Chang, Shengchang Wu:
**A new algorithm for calculating Adomian polynomials.**402-416

- Miodrag S. Petkovic, Dusan M. Milosevic:
**Improved Halley-like methods for the inclusion of polynomial zeros.**417-436

- Xiangxue Li, Kefei Chen:
**ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.**437-450

- A. Malek, H. G. Oskoei:
**Numerical solutions for constrained quadratic problems using high-performance neural networks.**451-471

- Je Hong Park, Seongtaek Chee:
**A note on digital signature scheme using a self-pairing map.**472-475

- Caixia Gao, Enmin Feng, Zongtao Wang, Zhilong Xiu:
**Parameters identification problem of the nonlinear dynamical system in microbial continuous cultures.**476-484

- Miltiades Elliotis, Georgios Georgiou, Christos Xenophontos:
**Solving Laplacian problems with boundary singularities: a comparison of a singular function boundary integral method with the p/hp version of the finite element method.**485-499

- Emad M. Abo-Eldahab, Ahmed F. Ghonaim:
**Radiation effect on heat transfer of a micropolar fluid through a porous medium.**500-510

- Kyungah Shim:
**Off-line password-guessing attacks on the generalized key agreement and password authentication protocol.**511-515

- Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
**Cryptanalysis of large RSA exponent by using the LLL algorithm.**516-525

- E. F. Elshehawey, Abd El-Rahman El-Saman, Mostafa El-Shahed, Mohamed Dagher:
**Peristaltic transport of a compressible viscous liquid through a tapered pore.**526-543

- Du Qikui, Tang Minxia:
**Exact and approximate artificial boundary conditions for the hyperbolic problems in unbounded domains.**544-562

- G. M. Abd El-Latif:
**An approximate solution treatment for non-linear problems.**563-575

- G. M. Abd El-Latif:
**A homotopy technique and a perturbation technique for non-linear problems.**576-588

- Jian-qin Mei, Hong-qing Zhang:
**New soliton-like and periodic-like solutions for the KdV equation.**589-599

- L. Kula, Y. Yayli:
**On slant helix and its spherical indicatrix.**600-607

- Wei-Guo Zhang, Zan Kan Nie:
**On admissible efficient portfolio selection policy.**608-623

- Kokou Y. Abalo, Michael M. Kostreva:
**Berge equilibrium: some recent results from fixed-point theorems.**624-638

- Abdul-Majid Wazwaz:
**Travelling wave solutions of generalized forms of Burgers, Burgers-KdV and Burgers-Huxley equations.**639-656

- Gong-Nong Li:
**Analysis for a homotopy path of complementarity problems based on mu-exceptional family.**657-670

- S. K. Tomar, Jaswant Singh:
**Transmission of longitudinal waves through a plane interface between two dissimilar porous elastic solid half-spaces.**671-688

- Zhongdi Cen:
**A hybrid difference scheme for a singularly perturbed convection-diffusion problem with discontinuous convection coefficient.**689-699

- Abdul-Majid Wazwaz:
**Exact solutions of compact and noncompact structures for the KP-BBM equation.**700-712

- Abdul-Majid Wazwaz:
**Compact and noncompact physical structures for the ZK-BBM equation.**713-725

- K. Vajravelu, S. Sreenadh, V. Ramesh Babu:
**Peristaltic pumping of a Herschel-Bulkley fluid in a channel.**726-735

- A. R. Mugdadi:
**The least squares type estimation of the parameters in the power hazard function.**737-748

- Awartani Awartani, M. H. Hamdan:
**Fully developed flow through a porous channel bounded by flat plates.**749-757

- Awartani Awartani, R. A. Ford, M. H. Hamdan:
**Computational complexities and streamfunction coordinates.**758-777

- Ming-Han Lin, Chin-Tai Chen:
**Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface.**778-796

- Shui-Ching Chang, Tze Fen Li:
**Estimation of component mean lifetimes of a masked system using unclassified system life data.**797-805

- Emad M. Abo-Eldahab, Ahmed M. Salem:
**MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream.**806-818

- Majid Jaberi Douraki, Mehdi Dehghan, A. Razavi:
**On the global behavior of higher order recursive sequences.**819-831

- Sunil, Divya, R. C. Sharma:
**Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium.**832-853

- Shuicai Li, Shi-Jun Liao:
**An analytic approach to solve multiple solutions of a strongly nonlinear problem.**854-865

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, G. Tohidi, S. Razavyan:
**The identification of nondominated and efficient paths on a network.**866-873

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, G. Tohidi:
**A method for generating all efficient solutions of 0-1 multi-objective linear programming problem.**874-886

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, G. Tohidi, S. Razavyan:
**A one-model approach to classification and sensitivity analysis in DEA.**887-896

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, M. Sanei, G. Tohidi:
**Sensitivity and stability analysis in DEA.**897-904

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, G. Tohidi, S. Razavyan:
**Sensitivity of efficiency classifications in the inverse DEA models.**905-916

- Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, G. Tohidi, S. Razavyan:
**Undesirable inputs and outputs in DEA models.**917-925

- M. A. Hernández, M. J. Rubio, J. A. Ezquerro:
**Solving a special case of conservative problems by Secant-like methods.**926-942

- Y. Ben Nakhi, S. L. Kalla:
**On a generalized mixture distribution.**943-952

- Chengri Jin, Mingzhu Liu:
**A new modification of Adomian decomposition method for solving a kind of evolution equation.**953-962

- Tzong-Mou Wu:
**One-to-one mapping matrix.**963-970

- Turabi Geyikli, Dogan Kaya:
**An application for a modified KdV equation by the decomposition method and finite element method.**971-981

- Yen-Cheng Chen, Lo-Yao Yeh:
**An efficient nonce-based authentication scheme with key agreement.**982-994

- Weiming Wang:
**An algorithm for solving nonlinear singular perturbation problems with mechanization.**995-1009

- Je Hong Park, Bo Gyeong Kang:
**Security of Lu et al.'s proxy-protected signature scheme.**1010-1015

- Jonas Rimas:
**On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices - II.**1016-1027

- Zhenqing Li, Weiming Wang:
**Mechanization for solving SPP by reducing order method.**1028-1037

- Caidi Zhao:
**Algorithm and mechanization to Cauchy problem of parabolic equation.**1038-1044

- Dogan Kaya:
**Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor.**1045-1062

- Jianhong Zhang, Yumin Wang:
**On the security of a convertible authenticated encryption.**1063-1069

- Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
**Remarks on some signature schemes based on factoring and discrete logarithms.**1070-1075

- Xing-Yang Guo, Chao-Jing Tang:
**Identity based designated multi-confirmer signature: a new type signature.**1076-1085

- Noël Bonneuil, Patrick Saint-Pierre:
**Population viability in three trophic-level food chains.**1086-1105

- S. R.-J. Jang, J. Baglama:
**Droop models of nutrient-plankton interaction with intratrophic predation.**1106-1128

- Shiyou Weng, Haiyin Gao, Renzhao Chen, Xuezhang Hou:
**Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous.**1129-1141

- Kourosh H. Shirazi:
**Five points of accuracy synthesis of motion generator linkages using Maple-V.**1142-1171

- Judong Shen, Shing I. Chang, E. Stanley Lee, Youping Deng, Susan J. Brown:
**Determination of cluster number in clustering microarray data.**1172-1185

- Shijun Liao:
**Comparison between the homotopy analysis method and homotopy perturbation method.**1186-1194

- Chorng-Shyong Ong, Jih-Jeng Huang, Gwo-Hshiung Tzeng:
**A novel hybrid model for portfolio selection.**1195-1210

- Jianhong Zhang, Yumin Wang:
**Two provably secure k-out-of-n oblivious transfer schemes.**1211-1220

- Yimin Wei, Yanhua Cao, Hua Xiang:
**A note on the componentwise perturbation bounds of matrix inverse and linear systems.**1221-1236

- Rongxing Lu, Zhenfu Cao:
**Designated verifier proxy signature scheme with message recovery.**1237-1246

- M. Zubaer Hossain, S. Reaz Ahmed, M. Wahhaj Uddin:
**Generalized mathematical model for the solution of mixed-boundary-value elastic problems.**1247-1275

- Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:
**A time-stamping protocol for digital watermarking.**1276-1284

- Jiqiang Lv, Xinmei Wang, Kwangjo Kim:
**Practical convertible authenticated encryption schemes using self-certified public keys.**1285-1297

- M. A. Ahmed:
**A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application.**1298-1304

- Bing Zheng, Ke Wang:
**Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem.**1305-1323

- Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
**Fail-stop blind signature scheme design based on pairings.**1324-1331

- Zhong-Yun Liu, Han-Dong Cao, Hui-Jiong Chen:
**A note on computing matrix-vector products with generalized centrosymmetric (centrohermitian) matrices.**1332-1345

- Wei Sun, Yao-Lin Jiang:
**Runge-Kutta methods of dynamic iteration for index-2 differential-algebraic equations.**1346-1363

- Gui-qiong Xu, Zhi-bin Li:
**PDEPtest: a package for the Painlevé test of nonlinear partial differential equations.**1364-1379

- Haiyong Bao, Zhenfu Cao, Rongxing Lu:
**Proxy signature scheme using self-certified public keys.**1380-1389

- Jonas Rimas:
**On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I.**1390-1394

- Weiming Wang, Zhenqing Li:
**The distribution models of grazing animals between two grassland resource points.**1395-1404

- Okey Oseloka Onyejekwe:
**A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows.**1405-1418

- Haiyong Bao, Zhenfu Cao, Shengbao Wang:
**Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.**1419-1430

- Chou Chen Yang, Yuan-Liang Tang, Ren-Chiun Wang, Hung-Wen Yang:
**A secure and efficient authentication protocol for anonymous channel in wireless communications.**1431-1439

- Reza Farzipoor Saen:
**Developing a nondiscretionary model of slacks-based measure in data envelopment analysis.**1440-1447

- Xing-Yang Guo, Chao-Jing Tang:
**Identity based group-oriented undeniable signature scheme.**1448-1457

- Tian-Shyr Dai, Guan-Shieng Huang, Yuh-Dauh Lyuu:
**An efficient convergent lattice algorithm for European Asian options.**1458-1471