|
Search the dblp DataBase
Dongvu Tonien:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dongvu Tonien, Reihaneh Safavi-Naini
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:82-97 [Conf]
- Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:183-193 [Conf]
- Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:264-275 [Conf]
- Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota
Birthday Paradox for Multi-collisions. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:29-40 [Conf]
- Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:131-145 [Conf]
- Dongvu Tonien, Reihaneh Safavi-Naini
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:42, n:2, pp:227-237 [Journal]
- Dongvu Tonien
On a traitor tracing scheme from ACISP 2003. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2006, v:100, n:1, pp:21-22 [Journal]
- Dongvu Tonien, Reihaneh Safavi-Naini
Recursive constructions of secure codes and hash families using difference function families. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 2006, v:113, n:4, pp:664-674 [Journal]
Unconditionally Secure Approximate Message Authentication. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|