메뉴 건너뛰기




Volumn 35, Issue 2-3, 2001, Pages 223-236

Broadcast anti-jamming systems

Author keywords

Anti jamming; Cover free family; Key distribution pattern; Perfect hash family

Indexed keywords


EID: 0346404159     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(00)00169-9     Document Type: Article
Times cited : (29)

References (28)
  • 2
    • 0000156664 scopus 로고    scopus 로고
    • Derandomization witnesses for Boolean matrix multiplication and construction of perfect hash functions
    • N. Alon, M. Naor, Derandomization witnesses for Boolean matrix multiplication and construction of perfect hash functions, Algorithmica 16 (1996) 434-449.
    • (1996) Algorithmica , vol.16 , pp. 434-449
    • Alon, N.1    Naor, M.2
  • 4
    • 0345952600 scopus 로고    scopus 로고
    • Combinatorics and threshold cryptology
    • Chapman and Hall/CRC Research Notes in Mathematics, CRC Press, London
    • S.R. Blackburn, Combinatorics and threshold cryptology, in: Combinatorial Designs and their Applications, Chapman and Hall/CRC Research Notes in Mathematics, CRC Press, London, 1999, 49-70.
    • (1999) Combinatorial Designs and their Applications , pp. 49-70
    • Blackburn, S.R.1
  • 5
    • 84947917753 scopus 로고    scopus 로고
    • Efficient multiplicative sharing schemes
    • Lecture Notes in Computer Science, Springer, Berlin
    • S.R. Blackburn, M. Burmester, Y. Desmedt, P.R. Wild, Efficient multiplicative sharing schemes, in: Advances in Cryptology-Eurocrypt '96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, 1996, pp. 107-118.
    • (1996) Advances in Cryptology-Eurocrypt '96 , vol.1070 , pp. 107-118
    • Blackburn, S.R.1    Burmester, M.2    Desmedt, Y.3    Wild, P.R.4
  • 8
    • 0030082030 scopus 로고    scopus 로고
    • Applications of mobile computing and communication
    • B. Bruegge, B. Bennington, Applications of mobile computing and communication, IEEE Personal Communication 3 (1) (1996) 64-71.
    • (1996) IEEE Personal Communication , vol.3 , Issue.1 , pp. 64-71
    • Bruegge, B.1    Bennington, B.2
  • 15
    • 0000934255 scopus 로고
    • Families of finite sets in which no set is covered by the union of two others
    • P. Erdös, P. Frankl, Z. Furedi, Families of finite sets in which no set is covered by the union of two others, Journal of Combinatorial Theory A 33 (1982) 158-166.
    • (1982) Journal of Combinatorial Theory A , vol.33 , pp. 158-166
    • Erdös, P.1    Frankl, P.2    Furedi, Z.3
  • 16
    • 51249175955 scopus 로고
    • Families of finite sets in which no set is covered by the union of r others
    • Israel
    • P. Erdós, P. Frankl, Z. Furedi, Families of finite sets in which no set is covered by the union of r others, Israel Journal of Mathematics 51 (1985) 79-89.
    • (1985) Journal of Mathematics , vol.51 , pp. 79-89
    • Erdós, P.1    Frankl, P.2    Furedi, Z.3
  • 18
    • 0030122596 scopus 로고    scopus 로고
    • Combinatorial bounds and design of broadcast authentication
    • H. Fujii, W. Kachen, K. Kurosawa, Combinatorial bounds and design of broadcast authentication, IEICE Trans. E - A 79 (4) (1996) 502-506.
    • (1996) IEICE Trans. E - A , vol.79 , Issue.4 , pp. 502-506
    • Fujii, H.1    Kachen, W.2    Kurosawa, K.3
  • 19
    • 0025212474 scopus 로고
    • A matrix key-distribution scheme
    • L. Gong, D.J. Wheeler, A matrix key-distribution scheme, J. Cryptology 2 (1990) 51-59.
    • (1990) J. Cryptology , vol.2 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 23
    • 0002828874 scopus 로고
    • Key distribution patterns using Minkowski planes
    • C.M. O'Keefe, Key distribution patterns using Minkowski planes, Designs, Codes and Cryptography 5 (1995) 261-267.
    • (1995) Designs, Codes and Cryptography , vol.5 , pp. 261-267
    • O'Keefe, C.M.1
  • 25
    • 0002724154 scopus 로고
    • Some constructions for key distribution patterns
    • K.A.S. Quinn, Some constructions for key distribution patterns, Designs Codes and Cryptography 4 (1994) 177-191.
    • (1994) Designs Codes and Cryptography , vol.4 , pp. 177-191
    • Quinn, K.A.S.1
  • 27
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • D.R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Designs Codes and Cryptography 12 (1997) 215-243.
    • (1997) Designs Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.