Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference13 articles.
1. Atici M., Magliveras S.S., Stinson D.R., Wei W.D.: Some recursive constructions for perfect hash families. J. Comb. Des. 4, 353–363 (1996).
2. Blackburn S.R.: Combinatorics and Threshold Cryptography. Combinatorial Designs and Their Applications, pp. 49–70. Chapman and Hall, Boca Raton (1999).
3. Blackburn S.R., Burmester M., Desmedt Y., Wild P.R.: Efficient Multiplicative Sharing Schemes. Lecture Notes in Computer Science vol. 1070, pp. 107–118. Springer, Berlin (1996).
4. Colbourn C.J., Martirosyan S.S., Van Trung T., Walker II R.A.: Roux-type constructions for covering arrays of strengths three and four. Des. Codes Cryptogr. 41(1), 33–57 (2006).
5. De Beule J., Klein A., Metsch K., Storme L.: Partial ovoids and partial spreads of clasical finite polar spaces. Serdica Math. J. 34, 689–714 (2008).
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献