53 results on '"Stinson, D"'
Search Results
2. Control of exchange coupling for direct overwrite media using Pd metal interlayer.
3. Improvement in the sensitivity of the magneto-optical media.
4. Correlation of composition and angular uniformity with performance in magneto-optic disks prepared from alloy targets.
5. The orientation of the magnetization of thin films as determined by the Hall effect.
6. Authorship Proof for Textual Document.
7. A construction for authentication / secrecy codes from certain combinatorial designs.
8. A Combinatorial Approach to Threshold Schemes.
9. Combinatorial solutions providing improved security for the generalized Russian cards problem.
10. The chronic bronchitic phenotype of COPD: an analysis of the COPDGene Study.
11. Some Constructions and Bounds for Authentication Codes.
12. An efficient identification protocol secure against concurrent-reset attacks.
13. Two attacks on a sensor network key distribution scheme of Cheng and Agrawal.
14. Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions.
15. An efficient and secure two-flow zero-knowledge identification protocol.
16. Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols.
17. Experimental techniques in measuring ferrite line widths with a cross-guide coupler.
18. Slope packings and coverings, and generic algorithms for the discrete logarithm problem.
19. New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups.
20. Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
21. Something About All or Nothing (Transforms).
22. New constructions for perfect hash families and related structures using combinatorial designs and codes.
23. The equivalence of certain equidistant binary codes and symmetric bibds.
24. The existence of howell designs of side n+1 and order 2 n.
25. A new proof of the Doyen-Wilson theorem.
26. A few more balanced Room squares.
27. Pair-packings and projective planes.
28. The spectrum of skew Room squares.
29. Some results concerning frames, Room squares, and subsquares.
30. Hanani triple systems.
31. An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions.
32. Graph decompositions and secret sharing schemes.
33. A construction for authentication/secrecy codes from certain combinatorial designs.
34. Some improved bounds on the information rate of perfect secret sharing schemes.
35. The combinatorics of authentication and secrecy codes.
36. Some constructions and bounds for authentication codes.
37. Some recursive constructions for perfect hash families.
38. Some new perfect one-factorizations from starters in finite fields.
39. Visual cryptography and threshold schemes.
40. Early Intravenous Indomethacin Prolongs Respiratory Support in Very Low Birth Weight Infants.
41. Pairwise balanced designs with block sizes 6 t + 1.
42. On the Dealer's Randomness Required in Secret Sharing Schemes.
43. On the existence of MOLS with equal-sized holes.
44. Orthogonal packings in PG(5, 2).
45. An even side analogue of Room squares.
46. On the spectrum of resolvable orthogonal arrays invariant under the Klein group K.
47. Massive Pericardial Effusion as a Cause for Sudden Deterioration of a Very Low Birthweight Infant.
48. Radial Line Discontinuities.
49. Corrosion-resistant protective overcoat for magnetooptical media.
50. The spectrum of nested Steiner triple systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.