共 13 条
- [1] Chen S.D., 2010, ARS COMBINATORIA, V99, P193
- [2] Chen SD, 2010, ARS COMBINATORIA, V97A, P453
- [3] Feng R.Q., 1999, NE MATH J, V15, P103
- [4] Authentication codes and bipartite graphs [J]. EUROPEAN JOURNAL OF COMBINATORICS, 2008, 29 (06) : 1473 - 1482
- [5] Gao Y., 1995, APPL MATH, V10, P345, DOI [10.1007/BF02662876, DOI 10.1007/BF02662876]
- [8] Simmons G., 1985, Authentication Theory/Coding Theory, P411, DOI DOI 10.1007/3-540-39568-7_32
- [9] SIMMONS GJ, 1988, LECT NOTES COMPUT SC, V304, P151
- [10] Stinson D. R., 1990, Journal of Cryptology, V2, P23, DOI 10.1007/BF02252868