Author:
Safavi–Naini Reihaneh,McAven Luke,Yung Moti
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Lecture Notes in Computer Science;E.F. Brickell,1988
2. Lecture Notes in Computer Science;D. Chaum,1991
3. Lecture Notes in Computer Science;Y. Desmedt,1991
4. Desmedt, Y., Frankel, Y., Yung, M.: Multi–receiver/multi–sender network security: efficient authenticated multicast/feedback. In: IEEE Infocom 1992, pp. 2045–2054 (1992)
5. Fujii, H., Kachen, W., Kurosawa, K.: Combinatorial bounds and design of broadcast authentication. IEICE Trans. E79-A(4), 502–506 (1996)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trends and Development of Information-Theoretic Cryptography;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2015
2. Perfect secrecy systems immune to spoofing attacks;International Journal of Information Security;2012-06-19
3. Multi-Verifier Signatures;Journal of Cryptology;2011-01-29
4. Unconditionally Secure Signature Schemes Revisited;Lecture Notes in Computer Science;2011
5. Unconditionally Secure Group Signatures;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2009