Applied Cryptography and Network Security
From MaRDI portal
Publication:5899210
DOI10.1007/11767480zbMATH Open1151.94576OpenAlexW4211109874MaRDI QIDQ5899210FDOQ5899210
Authors: Dongvu Tonien, Reihaneh Safavi-Naini
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Recommendations
Cited In (6)
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Title not available (Why is that?)
- A survey of cover-free families: constructions, applications, and generalizations
- Low-weight superimposed codes and related combinatorial structures: bounds and applications
- Black-box Trace\&Revoke codes
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899210)