scientific article; zbMATH DE number 1228785
From MaRDI portal
Publication:4221879
DOI<link itemprop=identifier href="https://doi.org/10.1002/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E" /><353::AID-JCD4>3.0.CO;2-E 10.1002/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-EzbMath0914.68087MaRDI QIDQ4221879
Wandi Wei, Spyros S. Magliveras, Mustafa Atici, Douglas R. Stinson
Publication date: 2 December 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Combinatorial aspects of block designs (05B05) Combinatorial aspects of matrices (incidence, Hadamard, etc.) (05B20) Parallel algorithms in computer science (68W10)
Related Items (30)
Bounds And Constructions For Threshold Shared Generation Of Authenticators ⋮ Perfect Hash Families: Constructions and Existence ⋮ A sequence approach to linear perfect hash families ⋮ Generalised cumulative arrays in secret sharing ⋮ Roux-type constructions for covering arrays of strengths three and four ⋮ Secret sharing schemes with partial broadcast channels ⋮ Cheating-immune secret sharing schemes from codes and cumulative arrays ⋮ Improved bounds for separating hash families ⋮ Linear Time Constructions of Some $$d$$-Restriction Problems ⋮ Perfect hash families of strength three with three rows from varieties on finite projective geometries ⋮ Detecting arrays for effects of single factors ⋮ Constructing heterogeneous hash families by puncturing linear transversal designs ⋮ Bounds for separating hash families ⋮ Unnamed Item ⋮ Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing ⋮ A recursive construction for perfect hash families ⋮ On generalized separating hash families ⋮ Geometric constructions of optimal linear perfect hash families ⋮ Explicit constructions of perfect hash families from algebraic curves over finite fields ⋮ Recursive constructions of secure codes and hash families using difference function families. ⋮ The combinatorics of generalised cumulative arrays ⋮ Constructions and bounds for separating hash families ⋮ Broadcast authentication for group communication ⋮ Explicit constructions for perfect hash families ⋮ Optimal linear perfect hash families ⋮ Randomness in secret sharing and visual cryptography schemes ⋮ Secure frameproof codes, key distribution patterns, group testing algorithms and related structures ⋮ Unnamed Item ⋮ Perfect hash families: Probabilistic methods and explicit constructions ⋮ On the state of strength-three covering arrays
This page was built for publication: