Author:
Bibak Khodakhast,Kapron Bruce M.,Srinivasan Venkatesh
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference7 articles.
1. Universal classes of hash functions;Carter;J. Comput. Syst. Sci.,1979
2. Codes which detect deception;Gilbert;Bell Syst. Tech. J.,1974
3. MMH: software message authentication in the Gbit/second rates;Halevi,1997
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献