394 results on '"Stinson, D"'
Search Results
2. Packing Costas Arrays
3. Population status of Bald Eagles breeding in Washington at the end of the 20th century
4. Some Baby-Step Giant-Step Algorithms for the Low Hamming Weight Discrete Logarithm Problem
5. Registered Replication Report: Study 1 From Finkel, Rusbult, Kumashiro, & Hannon (2002)
6. Authorship Proof for Textual Document
7. Key Preassigned Traceability Schemes for Broadcast Encryption
8. Universal Hashing and Multiple Authentication
9. An efficient identification protocol secure against concurrent-reset attacks
10. On the dealer's randomness required in secret sharing schemes
11. Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
12. Bounds for Resilient Functions and Orthogonal Arrays : Extended Abstract
13. An efficient and secure two-flow zero-knowledge identification protocol
14. Combinatorial solutions providing improved security for the generalized Russian cards problem
15. Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols
16. New General Lower Bounds on the Information Rate of Secret Sharing Schemes
17. Graph Decompositions and Secret Sharing Schemes
18. Universal hashing and authentication codes
19. Combinatorial characterizations of authentication codes
20. Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes : Extended Abstract
21. The Detection of Cheaters in Threshold Schemes
22. Steiner Triple Systems of Order 19 with Nontrivial Automorphism Group
23. On the Enumeration of One-Factorizations of Complete Graphs Containing Prescribed Automorphism Groups
24. 284457 Steiner Triple Systems of Order 19 Contain a Subsystem of Order 9
25. On Nonisomorphic Room Squares
26. On orthogonal generalized equitable rectangles
27. Generalized mix functions and orthogonal equitable rectangles
28. Some Observations on the Theory of Cryptographic Hash Functions
29. The Lovász Local Lemma and Its Applications to some Combinatorial Arrays
30. Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes
31. Something About All or Nothing (Transforms)
32. Authorship Proof for Textual Document
33. Time-of-flight analysis of the atom flux from a theta pinch plasma
34. On the maximum number of fixed points in automorphisms of prime order of 2-(v,k,1) designs
35. On the Dealer's Randomness Required in Secret Sharing Schemes
36. Graph decompositions and secret sharing schemes
37. An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions
38. Three characterizations of non-binary correlation-immune and resilient functions
39. Universal hashing and authentication codes
40. Hanani triple systems
41. Supplement to Steiner Triple Systems of Order 19 with Nontrivial Automorphism Group
42. 2000000 Steiner Triple Systems of Order 19
43. An explication of secret sharing schemes
44. Some improved bounds on the information rate of perfect secret sharing schemes
45. Applications of Combinatorial Designs to Communications, Cryptography, and Networking
46. The combinatorics of authentication and secrecy codes
47. Key Preassigned Traceability Schemes for Broadcast Encryption
48. Universal Hashing and Multiple Authentication
49. Seasonal affective disorder and season-dependent abnormalities of melatonin suppression by light
50. Combinatorial designs and cryptography
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.