The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2003, volume: 28, number: 3

  1. Mida Guillermo, Keith M. Martin, Christine M. O'Keefe
    Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:227-245 [Journal]
  2. Dong-Joon Shin, P. Vijay Kumar, Tor Helleseth
    3-Designs from the Z4-Goethals Codes via a New Kloosterman Sum Identity. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:247-263 [Journal]
  3. Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein
    Hypercubic 4 and 5-Designs from Double-Error-Correcting BCH Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:265-282 [Journal]
  4. David Masson
    Designs and Representation of the Symmetric Group. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:283-302 [Journal]
  5. Klaus Huber
    Taking pth Roots Modulo Polynomials over Finite Fields. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:303-311 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002