Optimal authentication systems and combinatorial designs
โ Scribed by Jimbo, M.; Fuji-Hara, R.
- Book ID
- 114540388
- Publisher
- IEEE
- Year
- 1990
- Tongue
- English
- Weight
- 689 KB
- Volume
- 36
- Category
- Article
- ISSN
- 0018-9448
- DOI
- 10.1109/18.50374
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
The strong partially balanced t-designs can be used to construct authentication codes, whose probabilities Pr of successful deception in an optimum spoofing attack of order r for r = 0, 1, . . . , t -1, achieve their information-theoretic lower bounds. In this paper a new family of strong partially
Combinatorial designs have long had substantial application in the statistical design of experiments, and in the theory of error-correcting codes. Applications in experimental and theoretical computer science, communications, cryptography and networking have also emerged in recent years. In this pap