The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1992, volume: 2, number: 4

  1. Nicola Melone, Udo Ott
    On the Rank of Truncated Incidence Matrices of Linear Spaces. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:307-313 [Journal]
  2. Shuhong Gao, Hendrik W. Lenstra Jr.
    Optimal Normal Bases. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:315-323 [Journal]
  3. Wen-Ai Jackson, Peter R. Wild
    Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:325-332 [Journal]
  4. Zhe-xian Wan
    Construction of Cartesian Authentication Codes from Unitary Geometry. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:333-356 [Journal]
  5. Douglas R. Stinson
    An Explication of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:357-390 [Journal]
  6. D. de Caen, Chris D. Godsil, Gordon F. Royle
    On the p-Rank of Incidence Matrices and a Bound of Bruen and Ott. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:391-394 [Journal]
  7. Bernhard Schmidt
    Note on a Question by S. Bagchi and B. Bagchi. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:395- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002