Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
The practice of authentication
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Some constructions and bounds for authentication codes
Proceedings on Advances in cryptology---CRYPTO '86
A construction for authentication/secrecy codes from certain combinatorial designs
Journal of Cryptology
Verification of Treaty Compliance -- Revisited
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Some constructions for authentication-secrecy codes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Bounds and constructions for authentication-secrecy codes with splitting
CRYPTO '88 Proceedings on Advances in cryptology
A signature with shared verification scheme
CRYPTO '89 Proceedings on Advances in cryptology
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Commitment and authentication systems
Designs, Codes and Cryptography
Hi-index | 0.00 |