Incidence structures applied to cryptography (Q1199628): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q5202624 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5184944 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some New Classes of Geometric Threshold Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3973159 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Codes Which Detect Deception / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key storage in secure networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The bank safe problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3829472 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authentication Theory/Coding Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934721 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5187321 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3495231 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4853712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Combinatorial Approach to Threshold Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The combinatorics of authentication and secrecy codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some constructions and bounds for authentication codes / rank
 
Normal rank

Latest revision as of 16:20, 16 May 2024

scientific article
Language Label Description Also known as
English
Incidence structures applied to cryptography
scientific article

    Statements

    Incidence structures applied to cryptography (English)
    0 references
    16 January 1993
    0 references
    0 references
    security
    0 references
    communications network
    0 references
    Key management
    0 references
    key distribution patterns
    0 references
    secret sharing schemes
    0 references
    combinatorial designs
    0 references
    authentication schemes
    0 references
    0 references
    0 references