MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Citation:
Pan Sheng-Gen. THE OPERATOR METHOD FOR THE DETERMINATION OF DYADIC GREEN S FUNCTIONS[J]. Journal of Electronics & Information Technology, 1984, 6(3): 181-188.
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Citation:
Pan Sheng-Gen. THE OPERATOR METHOD FOR THE DETERMINATION OF DYADIC GREEN S FUNCTIONS[J]. Journal of Electronics & Information Technology, 1984, 6(3): 181-188.
The operator method for the determination of dyadic Green s functions is presented by the extention of concepts of vector space to dyadic space, and the new expression for the dyadic magnetic wave equation is derived strictly by using the theory of distribution. As an exam-ple, the dyadic Green s functions in generalized cylindrical waveguides are given.
Y. Rahmat-samii, IEEE Trans. on MTT, MTT-23(1975), 762.[3]J. J. H. Wang, IEEE Trans. on MTT, MTT-26 (1978), 457.[4]霍美瑜,科学通报,6(1981), 686.[5]N. I. Akhiez, Theory of Linear Operators in Hilbert Space, McGraw-Hill,(1965), pp. 127.[7]J. J. H. Wang, IEEE Trans. on AP, AP-30(1982); 463.
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443