Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification codes in cryptographic protocols., , , and . ITW, page 1-5. IEEE, (2010)On identifying codes., , , and . Codes and Association Schemes, volume 56 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 97-109. DIMACS/AMS, (1999)Binary Codes for Collusion-Secure Fingerprinting., , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 178-185. Springer, (2001)On the Density of Best Coverings in Hamming Spaces., and . Coding Theory and Applications, volume 311 of Lecture Notes in Computer Science, page 39-44. Springer, (1986)Convolutional Tanner structures for non-ergodic wireless channels., , and . ISIT, page 1163-1167. IEEE, (2008)Bounds on distance distributions in codes of known size., , , and . ISIT, page 486. IEEE, (2004)The average radius of codes: Survey and new results., , and . ISIT, page 1792-1795. IEEE, (2011)Variations on Minimal Linear Codes., and . ICMCTA, volume 3 of CIM Series in Mathematical Sciences, page 125-131. Springer, (2014)On a conjecture concerning coverings of Hamming space., , and . AAECC, volume 228 of Lecture Notes in Computer Science, page 79-89. Springer, (1984)Residual error rate of binary linear block codes (Corresp.)., and . IEEE Trans. Inf. Theory, 22 (4): 483-485 (1976)