Authentication theory and hypothesis testing
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Rolf Johannesson,et al. Strengthening Simmons' bound on impersonation , 1991, IEEE Trans. Inf. Theory.
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[5] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[6] Andrea Sgarro,et al. Information-Theoretic Bounds for Authentication Frauds , 1992, J. Comput. Secur..
[7] Douglas R. Stinson. Some Constructions and Bounds for authentication Codes , 1986, CRYPTO.
[8] Andrea Sgarro,et al. Informational Divergence Bounds for Authentication Codes , 1990, EUROCRYPT.
[9] Viiveke Fåk. Repeated use of codes which detect deception (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[10] Andrea Sgarro. Blind coding: authentication frauds from the point of view of rate-distortion theory , 2001 .
[11] Ben J. M. Smeets. Bounds on the probability of deception in multiple authentication , 1994, IEEE Trans. Inf. Theory.
[12] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[13] F. MacWilliams,et al. Codes which detect deception , 1974 .
[14] Rainer A. Rueppel. Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings , 1993 .
[15] Thomas Johansson. Lower bounds on the probability of deception in authentication with arbitration , 1994, IEEE Trans. Inf. Theory.