Key storage in secure networks

From MaRDI portal
Publication:1113873

DOI10.1016/0166-218X(88)90068-6zbMath0661.94012OpenAlexW2088379485MaRDI QIDQ1113873

Fred C. Piper, Chris J. Mitchell

Publication date: 1988

Published in: Discrete Applied Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0166-218x(88)90068-6




Related Items (42)

Almost cover-free codesSOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODESUNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONSOn key storage in secure networksOn the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor NetworksSignal-flow-based analysis of wireless security protocolsOn optimal cryptographic key derivationLinear Time Constructions of Some $$d$$-Restriction ProblemsUnnamed ItemConstructions for key distribution patternsA survey on nonadaptive group testing algorithms through the angle of decodingImproved upper bounds for the rate of separating and completely separating codesA note on the uniqueness of \((w, r)\) cover-free codesAsymptotic bounds for the rate of colored superimposed codesUnnamed ItemConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Generalized cover-free families.Uniqueness of some optimal superimposed codesThreshold behavior of multi-path random key pre-distribution for sparse wireless sensor networksSome new bounds for cover-free familiesCover-free codes and separating system codesAlmost cover-free codes and designsAn unexpected meeting of four seemingly unrelated problems: graph testing, DNA complex screening, superimposed codes and secure key distributionBounds on the rate of separating codesIncidence structures applied to cryptographyThreshold and Majority Group TestingSome new bounds for cover-free families through biclique coversExplicit constructions of perfect hash families from algebraic curves over finite fieldsBounds on the rate of disjunctive codesBroadcast authentication for group communicationKey pre-distribution in a non-uniform rectangular grid for wireless sensor networksOn the construction of \((w,r)\) cover-free codesOn \(\tau\)-time secure key agreementKey distribution patterns using Minkowski planesThe Rise and Fall and Rise of Combinatorial Key PredistributionLinear broadcast encryption schemesSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresUnnamed ItemUnnamed ItemMultireceiver authentication codes: Models, bounds, constructions, and extensionsOn the cardinality of intersection sets in inversive planesSome constructions for key distribution patterns



Cites Work


This page was built for publication: Key storage in secure networks