JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (12): 97-101.doi: 10.6040/j.issn.1671-9352.0.2019.025
WANG Xiao
CLC Number:
[1] APOSTOLT M. Introduction to analytic number theory[M]. New York: Springer-Verlag, 1976. [2] ZHANG Wenpeng, HU Jiayuan. The hybrid power mean of three-term character sums and two-term exponential sums[J]. Bulletin Mathématique de la Société des Sciences Mathématiques de Roumanie, 2017, 60(108):173-180. [3] BURGESS D A. On character sums and primitive roots[J]. Proceedings of the London Mathematical Society, 1962, 12:179-192. [4] BURGESS D A. On Dirichlet characters of polynomials[J]. Proceedings of the London Mathematical Society, 1963, 13:537-548. [5] COCHRANE T, ZHENG Zhiyong. Bounds for certain exponential sums[J]. Asian Journal of Mathematics, 2000, 4:757-774. [6] COCHRANE T. Exponential sums modulo prime powers[J]. Acta Arithmetica, 2002, 101:131-149. [7] ZHANG Wenpeng, YI Yuan. On Dirichlet characters of polynomials[J]. Bulletin of the London Mathematical Society, 2002, 34:469-473. [8] ZHANG Wenpeng, YAO Weili. A note on the Dirichlet characters of polynomials[J]. Acta Arithmetica, 2004, 115:225-229. [9] ZHANG Wenpeng, WANG Tingting. A note on the Dirichlet characters of polynomials[J]. Mathematica Slovaca, 2014, 64, No.2:301-310. [10] HAN Di. A hybrid mean value involving two-term exponential sums and polynomial character sums[J]. Czechoslovak Mathematical Journal, 2014, 64:53-62. [11] ZHANG Wenpeng, HAN Di. On the sixth power mean of the two-term exponential sums[J]. Journal of Number Theory, 2014, 136:403-413. |
[1] | LUO Peng, YANG Xiao-yuan. Identity-based encryption in multiple PKG environment based on ring signature [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 64-68. |
[2] | WANG Wei-li, HU Bin, ZHAO Xiu-feng. An efficient multi-identity-based fully homomorphic encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 85-94. |
[3] | QU Juan, LI Yan-ping. A secure dynamic identity-based remote user authentication scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(1): 37-42. |
[4] | . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67. |
[5] | ZHU Zhi-qiang, MA Ke-xin, SUN Lei. A zero-knowledge proof based remote desktop authentication protocol [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 47-52. |
[6] | SONG Xian-mei, XIONG Lei. MacWilliams identity and self-dual codes of linear codes over Z2a+uZ2a [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 72-78. |
[7] | YUAN Bian-qing, LIU Ji-qiang. An offline sharable mCoupons scheme based on NFC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 56-61. |
[8] | LIU Xiu-sheng, LIU Hua-lu. MacWilliams identities of the linear codes over ring Fp+vFp [J]. J4, 2013, 48(12): 61-65. |
[9] | . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14. |
[10] | WANG Juan1,2, HE Qi1, YAN Fei1,2, JIANG Wan-wei1, YANG Ming1, WANG Yan1. A user-centric identity management and authentication system for mobile Internet [J]. J4, 2012, 47(11): 12-17. |
[11] | LIANG Shao-Hui, DIAO Ban. Resarches on some properties of a strong FS-Poset [J]. J4, 2009, 44(8): 51-55. |
[12] | WU Xiaogui, ZHANG Jianhua. Linear maps preserving Jacobi identity on the full matrix algebras [J]. J4, 2009, 44(1): 49-52 . |
[13] | LI Zhi-rong and LI Ying-hui . A new kind of summation formulae involving the Genocchi number and Riemann Zeta function [J]. J4, 2007, 42(4): 79-83 . |
[14] | LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 . |
|