Author:
Wang Shuhong,Safavi-Naini Reihaneh
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;G.J. Simmons,1985
2. Lecture Notes in Computer Science;G.J. Simmons,1988
3. Simmons, G.J.: A survey of information authentication. In: Simmons, G.J. (ed.) Contemporary Cryptology, The Science of Information Integrity, pp. 379???419. IEEE Press, Los Alamitos (1992);
4. Preliminary version appeared in Proceedings of the IEEE??76, 603???620 (1988)
5. Shannon, C.E.: A mathematical theory of communication. Mobile Computing and Communications Review 5(1), 3–55 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-Designated Receiver Authentication Codes: Models and Constructions;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2023-03-01