New combinatorial bounds for authentication codes and key predistribution schemes

被引:0
|
作者
机构
来源
Des Codes Cryptography | / 1卷 / 87-100期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [22] Key establishment algorithms for some deterministic key predistribution schemes
    Ruj, Sushmita
    Roy, Birnal
    WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 68 - 77
  • [23] Combinatorial characterizations of authentication codes
    Stinson, D.R.
    Designs, Codes and Cryptography, 1992, 2 (02)
  • [24] Generation of key predistribution schemes using secret sharing schemes
    Sáez, G
    DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 239 - 249
  • [25] COMBINATORIAL CHARACTERIZATIONS OF AUTHENTICATION CODES
    STINSON, DR
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 61 - 73
  • [26] A Scalable Key Predistribution Scheme Based On Combinatorial Designs
    Yu, Wangke
    Ma, Wenping
    Wang, Shuhua
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [27] A combinatorial approach to key predistribution for distributed sensor networks
    Lee, J
    Stinson, DR
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1200 - 1205
  • [28] A class of key predistribution schemes based on orthogonal arrays
    Dong, Jun-Wu
    Pei, Ding-Yi
    Wang, Xue-Li
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 825 - 831
  • [29] Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    Attrapadung, N
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 374 - 391
  • [30] Deterministic key predistribution schemes for distributed sensor networks
    Lee, JY
    Stinson, DR
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 294 - 307