scientific article; zbMATH DE number 1228785

From MaRDI portal
Publication:4221879

DOI<link itemprop=identifier href="https://doi.org/10.1002/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E" /><353::AID-JCD4>3.0.CO;2-E 10.1002/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-EzbMath0914.68087MaRDI QIDQ4221879

Wandi Wei, Spyros S. Magliveras, Mustafa Atici, Douglas R. Stinson

Publication date: 2 December 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (30)

Bounds And Constructions For Threshold Shared Generation Of AuthenticatorsPerfect Hash Families: Constructions and ExistenceA sequence approach to linear perfect hash familiesGeneralised cumulative arrays in secret sharingRoux-type constructions for covering arrays of strengths three and fourSecret sharing schemes with partial broadcast channelsCheating-immune secret sharing schemes from codes and cumulative arraysImproved bounds for separating hash familiesLinear Time Constructions of Some $$d$$-Restriction ProblemsPerfect hash families of strength three with three rows from varieties on finite projective geometriesDetecting arrays for effects of single factorsConstructing heterogeneous hash families by puncturing linear transversal designsBounds for separating hash familiesUnnamed ItemEvolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret SharingA recursive construction for perfect hash familiesOn generalized separating hash familiesGeometric constructions of optimal linear perfect hash familiesExplicit constructions of perfect hash families from algebraic curves over finite fieldsRecursive constructions of secure codes and hash families using difference function families.The combinatorics of generalised cumulative arraysConstructions and bounds for separating hash familiesBroadcast authentication for group communicationExplicit constructions for perfect hash familiesOptimal linear perfect hash familiesRandomness in secret sharing and visual cryptography schemesSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresUnnamed ItemPerfect hash families: Probabilistic methods and explicit constructionsOn the state of strength-three covering arrays






This page was built for publication: