Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. N. Alon, J. Bruck, J. Naor, M. Naor, R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, Vol. 38, No. 2, March 1992
2. M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor Checking the Correctness of Memories, Proc. 31st Symp. on Foundations of Computer Science, October 1990.
3. E. F. Brickell. A Few Results in Message Authentication Congressus Numerantium 43 (1984), 141–154.
4. E. Gilbert, F. J. MacWilliams, N. Sloane, Codes Which Detect Deception, The Bell System Technical Journal, Vol. 53, No. 3, March 1974
5. M. Jimbo, R. Fuji-hara. Optimal Authentication Systems and Combinatorial Designs, IEEE Transactions on Information Theory, vol. 36, no 1, January 1990, pp 54–62.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献