![]() |
Volumn 473 LNCS, Issue , 1991, Pages 306-312
|
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
a a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTHENTICATION;
CRYPTOGRAPHY;
AUTHENTICATION CODES;
CARTESIANS;
GROUPING TECHNIQUE;
INFORMATION RATES;
SPOOFING ATTACKS;
TRANSMISSION RATES;
CODES (SYMBOLS);
|
EID: 33749925176
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/3-540-46877-3_27 Document Type: Conference Paper |
Times cited : (11)
|
References (7)
|