Author of the publication

Characterization of Optimal Authentication Codes with Arbitration.

, , , and . ACISP, volume 1587 of Lecture Notes in Computer Science, page 303-313. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 284-299. Springer, (2010)Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 34-46. Springer, (2011)New Family of Non-Cartesian Perfect Authentication Codes.. IWCC, volume 5557 of Lecture Notes in Computer Science, page 188-201. Springer, (2009)Reconstructing Synergy-Based Hand Grasp Kinematics from Electroencephalographic Signals., , , and . Sensors, 22 (14): 5349 (2022)Generalizability of Hand Kinematic Synergies derived using Independent Component Analysis., , and . EMBC, page 621-624. IEEE, (2021)Learning Hand Gestures using Synergies in a Humanoid Robot., , , , , and . ROBIO, page 1-6. IEEE, (2023)A Construction of Zero-Difference Functions., and . CoRR, (2018)The Correlation of a Boolean Function with Its Variables., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 1-8. Springer, (2000)On Delegatability of Four Designated Verifier Signatures., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 61-71. Springer, (2005)Decoding Synergy-Based Hand Movements using Electroencephalography., , , and . EMBC, page 4816-4819. IEEE, (2018)