메뉴 건너뛰기




Volumn 4, Issue 5, 1996, Pages 365-375

Authentication perpendicular arrays APA1 (2, 5, v)

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0346751610     PISSN: 10638539     EISSN: None     Source Type: Journal    
DOI: 10.1002/(SICI)1520-6610(1996)4:5<365::AID-JCD5>3.0.CO;2-D     Document Type: Article
Times cited : (15)

References (17)
  • 4
    • 26044457670 scopus 로고
    • Theory of perpendicular arrays
    • J. Bierbrauer and Y. Edel, Theory of perpendicular arrays, J. Combin. Designs 2 (1994), 375-406.
    • (1994) J. Combin. Designs , vol.2 , pp. 375-406
    • Bierbrauer, J.1    Edel, Y.2
  • 7
    • 1342274518 scopus 로고
    • Nested Steiner n-cycle systems and perpendicular arrays
    • A. Granville, A. Moisiadis, and R. Rees, Nested Steiner n-cycle systems and perpendicular arrays, JCMCC 3 (1988), 163-167.
    • (1988) JCMCC , vol.3 , pp. 163-167
    • Granville, A.1    Moisiadis, A.2    Rees, R.3
  • 9
    • 0000928942 scopus 로고
    • Decomposition into cycles II: Cycle systems
    • Wiley, New York
    • C. C. Lindner and C. A. Rodger, "Decomposition into cycles II: Cycle systems," Contemporary design theory, Wiley, New York, 1992, pp. 325-369.
    • (1992) Contemporary Design Theory , pp. 325-369
    • Lindner, C.C.1    Rodger, C.A.2
  • 11
    • 85033867627 scopus 로고    scopus 로고
    • Private communication
    • Y. Lu, Private communication.
    • Lu, Y.1
  • 13
    • 0024144985 scopus 로고
    • A construction for authentication/secrecy codes from certain combinatorial designs
    • D. R. Stinson, A construction for authentication/secrecy codes from certain combinatorial designs, J. Cryptology 1 (1988), 119-127.
    • (1988) J. Cryptology , vol.1 , pp. 119-127
    • Stinson, D.R.1
  • 14
    • 0023828936 scopus 로고
    • Some constructions and bounds for authentication codes
    • _, Some constructions and bounds for authentication codes, J. Cryptology 1 (1988), 37-51.
    • (1988) J. Cryptology , vol.1 , pp. 37-51
  • 15
    • 0025212061 scopus 로고
    • The combinatorics of authentication and secrecy codes
    • _, The combinatorics of authentication and secrecy codes, J. Cryptology 2 (1990), 23-49.
    • (1990) J. Cryptology , vol.2 , pp. 23-49
  • 16
    • 1342295660 scopus 로고
    • A construction for authentication/secrecy codes from 3-homogeneous permutation groups
    • D. R. Stinson and L. Teirlink, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, Europ. J. Combin. 11 (1990), 73-79.
    • (1990) Europ. J. Combin. , vol.11 , pp. 73-79
    • Stinson, D.R.1    Teirlink, L.2
  • 17
    • 0002954340 scopus 로고
    • Constructions and uses of pairwise balanced designs
    • R. M. Wilson, Constructions and uses of pairwise balanced designs, Math. Centre Tracts 55 (1974), 18-41.
    • (1974) Math. Centre Tracts , vol.55 , pp. 18-41
    • Wilson, R.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.