Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference10 articles.
1. G. Castagnoli, Comments on Massey's concepts of perfect secrecy and perfect authenticity, Alta Frequenza, Vol. LVI, No. 4 (1987), 227–228.
2. M. De Soete, Some constructions for authentication—secrecy codes, Advances in Cryptology—Proceedings of Eurocrypt 88, Lecture Notes in Computer Science, Vol. 330, Springer-Verlag, Berlin, 1988, pp. 57–75.
3. M. De Soete, K. Vedder, and M. Walker, Authentication schemes (to appear in the Proceedings of Eurocrypt 89).
4. V. Fak, Repeated use of codes which detect deception, IEEE Transactions on Information Theory, Vol. IT-25, No. 2 (1979), 233–234.
5. E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell System Technical Journal, Vol. 53 (1974), 405–424.
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献