A Uniied and Generalized Treatment of Authentication Theory
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] F. MacWilliams,et al. Codes which detect deception , 1974 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Viiveke Fåk. Repeated use of codes which detect deception (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[5] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[6] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[7] Andrea Sgarro,et al. Informational Divergence Bounds for Authentication Codes , 1990, EUROCRYPT.
[8] Rolf Johannesson,et al. Strengthening Simmons' bound on impersonation , 1991, IEEE Trans. Inf. Theory.
[9] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[10] Thomas Johansson. Lower bounds on the probability of deception in authentication with arbitration , 1994, IEEE Trans. Inf. Theory.
[11] Ben J. M. Smeets. Bounds on the probability of deception in multiple authentication , 1994, IEEE Trans. Inf. Theory.