New combinatorial bounds for authentication codes and key predistribution schemes

被引:0
|
作者
机构
来源
Des Codes Cryptography | / 1卷 / 87-100期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Deterministic key predistribution schemes for distributed sensor networks
    Lee, JY
    Stinson, DR
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 294 - 307
  • [32] A Class of Key Predistribution Schemes Based on Orthogonal Arrays
    董军武
    裴定一
    王学理
    JournalofComputerScience&Technology, 2008, (05) : 825 - 831
  • [33] Combinatorial bounds and design of broadcast authentication
    Fujii, H
    Kachen, W
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (04) : 502 - 506
  • [34] A Survey of Key Predistribution Schemes for Key Management in Wireless Sensor Networks
    Manoj, R.
    Dhinakaran, N.
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 135 - +
  • [35] On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
    Martin, Keith M.
    CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 124 - 145
  • [36] A Class of Key Predistribution Schemes Based on Orthogonal Arrays
    Jun-Wu Dong
    Ding-Yi Pei
    Xue-Li Wang
    Journal of Computer Science and Technology, 2008, 23 : 825 - 831
  • [37] Combinatorial Designs for Authentication and Secrecy Codes
    Huber, Michael
    FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (06): : 581 - +
  • [38] Combinatorial characterizations of authentication codes II
    Rees, Rolf S.
    Stinson, Douglas R.
    Designs, Codes, and Cryptography, 1996, 7 (03):
  • [39] Bounds and Characterizations of Authentication/Secrecy Schemes
    Casse L.R.A.
    Martin K.M.
    Wild P.R.
    Designs, Codes and Cryptography, 1998, 13 (2) : 107 - 129
  • [40] Combinatorial and LP bounds for LRC codes
    Hu, Sihuang
    Tamo, Itzhak
    Barg, Alexander
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1008 - 1012