The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1995, volume: 5, number: 3

  1. Marco Carpentieri
    A Perfect Threshold Secret Sharing Scheme to Identify Cheaters. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:183-187 [Journal]
  2. Charles J. Colbourn, Jeffrey H. Dinitz, Mieczyslaw Wojtas
    Thwarts in Transversal Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:189-197 [Journal]
  3. Robert Craigen
    The Structure of Weighing Matrices Having Large Weights. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:199-216 [Journal]
  4. Tuvi Etzion, Victor K. Wei, Zhen Zhang
    Bounds on the Sizes of Constant Weight Covering Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:217-239 [Journal]
  5. K. Gopalakrishnan, Douglas R. Stinson
    Three Characterizations of Non-binary Correlation-Immune and Resilient Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:241-251 [Journal]
  6. Akihiro Munemasa
    On Perfect t-Shift Codes in Abelian Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:253-259 [Journal]
  7. Christine M. O'Keefe
    Key Distribution Patterns Using Minkowski Planes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:261-267 [Journal]
  8. Tran van Trung
    On the Construction of Authentication and Secrecy Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:269-280 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002