The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Vanroose: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan
    On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:306-312 [Conf]
  2. M. Ruszinko, Peter Vanroose
    How an Erdöos-Rényi-type search approach gives an explicit code construction of rate 1 for random access with multiplicity feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:1, pp:368-372 [Journal]
  3. Peter Vanroose
    Code construction for the noiseless binary switching multiple-access channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1100-0 [Journal]
  4. Peter Vanroose, Edward C. van der Meulen
    Uniquely decodable codes for deterministic relay channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1203-1212 [Journal]
  5. Zhe-xian Wan, Ben J. M. Smeets, Peter Vanroose
    On the construction of cartesian authentication codes over symplectic spaces. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:920-0 [Journal]

Search in 0.000secs, Finished in 0.000secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002