Author:
Rees Rolf S.,Stinson Douglas R.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference17 articles.
1. E. F. Brickell, A few results in message authentication, Congressus Numer., Vol. 43 (1984), pp. 141?154.
2. M. De Soete, K. Vedder and M. Walker, Cartesian authentication schemes: Proceedings of EUROCRYPT '89, Lecture Notes in Comput. Sci., 434(1990) pp. 476?490.
3. M. De Soete, New bounds and constructions for authentication / secrecy codes with splitting, Journal of Cryptology, Vol. 6 (1991) pp. 173?186.
4. E. N. Gilbert, F. J. MacWilliams and N. J. A. Sloane, Codes which detect deception, Bell System Tech. Journal, Vol. 53 (1974) pp. 405?424.
5. M. Hall, Jr., Combinatorial Theory, second edition. John Wiley & Sons (1986).
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献