281 – 289 of 289
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 1998
-
Mark
Review of Nina Wormbs. Genom tråd och eter : framväxten av distributionsnätet för radion och TV i Stockholm
- Contribution to journal › Review (Book/Film/Exhibition/etc.)
-
Mark
Unconditionally Secure Group Authentication
- Contribution to journal › Article
- 1997
-
Mark
A digital signature scheme based on random error-correcting codes
(1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast authentication codes based on random polynomial residue classes
(1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multialphabet coding with separate alphabet description
(1997) Proceedings of the 1997 International Conference on Compression and Complexity of Sequences p.56-65
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
On the construction of Cartesian authentication codes over symplectic spaces
- Contribution to journal › Article
-
Mark
Bounds on the probability of deception in multiple authentication
- Contribution to journal › Article
- 1991
-
Mark
A lower bound on the probability of deception in multiple authentication
(1991) 1991 IEEE International Symposium on Information Theory, ISIT 1991 In IEEE International Symposium on Information Theory - Proceedings p.180-180
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
(1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
