Authentication theory and hypothesis testing
From MaRDI portal
DOI10.1109/18.850674zbMATH Open1001.94033OpenAlexW2169128714MaRDI QIDQ4501743FDOQ4501743
Authors: Ueli M. Maurer
Publication date: 7 September 2000
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/6d18995074d9e3b7b13ed6dd64147d8b41d63bb1
Recommendations
Cited In (19)
- A lower bound on authentication after having observed a sequence of messages
- Anonymity Protocols as Noisy Channels
- An information-theoretic model for steganography
- Authentication Theory/Coding Theory
- Blind coding: authentication frauds from the point of view of rate-distortion theory
- Title not available (Why is that?)
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- Legal messages for some message authentication functions in block ciphers
- Anonymity protocols as noisy channels
- Title not available (Why is that?)
- Message authentication with arbitration of transmitter/receiver disputes
- On the experimental estimation of the lower bound for the maximum number of messages in a scheme aimed at data protection against spoofing
- A unified and generalized treatment of authentication theory
- New Trends in Chaos-Based Communications and Signal Processing
- Title not available (Why is that?)
- On message authentication with a correlated setup
- Commitment and authentication systems
- Message authentication and dynamic passwords
- Unconditionally Secure Approximate Message Authentication
This page was built for publication: Authentication theory and hypothesis testing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4501743)