The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2004, volume: 32, number: 1-3

  1. Simeon Ball, John Bamberg, Michel Lavrauw, Tim Penttila
    Symplectic Spreads. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:9-14 [Journal]
  2. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo
    Design of Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:15-44 [Journal]
  3. Julia M. N. Brown
    On the Action of the Groups GL(n+1, q), PGL(n+1, q), SL(n+1, q) and PSL(n+1, q) on PG(n, qt). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:45-50 [Journal]
  4. Wensong Chu, Charles J. Colbourn, Peter Dukes
    Constructions for Permutation Codes in Powerline Communications. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:51-64 [Journal]
  5. Charles J. Colbourn, Alan C. H. Ling, Violet R. Syrotiuk
    Cover-Free Families and Topology-Transparent Scheduling for MANETs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:65-95 [Journal]
  6. Antonio Cossidente, Marialuisa J. de Resmini
    Remarks on Singer Cyclic Groups and Their Normalizers. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:97-102 [Journal]
  7. Frank De Clerck, Mario Delanote
    On (0, alpha)-Geometries and Dual Semipartial Geometries Fully Embedded in an Affine Space. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:103-110 [Journal]
  8. Nikias de Feyter
    Planar Oval Sets in Desarguesian Planes of Even Order. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:111-119 [Journal]
  9. D. Deng, Douglas R. Stinson, Ruizhong Wei
    The Lovász Local Lemma and Its Applications to some Combinatorial Arrays. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:121-134 [Journal]
  10. Alfredo De Santis, Barbara Masucci
    Anonymous Membership Broadcast Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:135-151 [Journal]
  11. Stefaan De Winter, Joseph A. Thas
    SPG-Reguli Satisfying the Polar Property and a New Semipartial Geometry. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:153-166 [Journal]
  12. David A. Drake, Wendy J. Myrvold
    Nets of Small Degree Without Ovals. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:167-183 [Journal]
  13. Ziba Eslami, Gholamreza B. Khosrovshahi, M. Mohammad-Noori
    Enumeration of t-Designs Through Intersection Matrices. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:185-191 [Journal]
  14. Stelios Georgiou, Christos Koukouvinos
    Self-Orthogonal and Self-Dual Codes Constructed via Combinatorial Designs and Diophantine Equations. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:193-206 [Journal]
  15. Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt
    On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:207-216 [Journal]
  16. Otokar Grosek, Peter Horák, Tran van Trung
    On Non-Polynomial Latin Squares. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:217-226 [Journal]
  17. Yury J. Ionin
    Regular Hadamard Matrices Generating Infinite Families of Symmetric Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:227-233 [Journal]
  18. Gholamreza B. Khosrovshahi, Behruz Tayfeh-Rezaie
    Some Indecomposable t-Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:235-238 [Journal]
  19. Gábor Korchmáros, Angelo Sonnino
    Hyperbolic Ovals in Finite Planes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:239-249 [Journal]
  20. Selda Küçükçifçi, Charles C. Lindner
    Minimum Covering for Hexagon Triple Systems. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:251-265 [Journal]
  21. Domenico Labbate
    Amalgams of Cubic Bipartite Graphs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:267-275 [Journal]
  22. Reinhard Laue
    Resolvable t-Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:277-301 [Journal]
  23. X. Ma, Ruizhong Wei
    On a Bound of Cover-Free Families. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:303-321 [Journal]
  24. Sosina Martirosyan, Tran van Trung
    On t-Covering Arrays. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:323-339 [Journal]
  25. Keith E. Mellinger
    LDPC Codes from Triangle-Free Line Sets. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:341-350 [Journal]
  26. Alan Offer, Hendrik Van Maldeghem
    Spreads and Ovoids Translation with Respect to Disjoint Flags. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:351-367 [Journal]
  27. Tanya E. Seidel, Daniel Socek, Michal Sramka
    Parallel Symmetric Attack on NTRU using Non-Deterministic Lattice Reduction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:369-379 [Journal]
  28. Ron Shaw, Neil A. Gordon
    The Quintic Grassmannian G{1, 4, 2} in PG(9, 2). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:381-396 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002