Cheraghi, Abbas The lower bound and exact value of the information rate of some developed graph access structures. (English) Zbl 1453.94132 Proyecciones 39, No. 4, 1005-1017 (2020). MSC: 94A62 PDF BibTeX XML Cite \textit{A. Cheraghi}, Proyecciones 39, No. 4, 1005--1017 (2020; Zbl 1453.94132) Full Text: DOI
Sridharan, Sriraman; Balakrishnan, R. Discrete mathematics: graph algorithms, algebraic structures, coding theory, and cryptography. (English) Zbl 1420.05002 Boca Raton, FL: CRC Press (ISBN 978-0-8153-4739-2/hbk; 978-0-429-48632-6/ebook). xxv, 311 p. (2020). MSC: 05-01 05C85 05C90 94A60 94A62 PDF BibTeX XML Cite \textit{S. Sridharan} and \textit{R. Balakrishnan}, Discrete mathematics: graph algorithms, algebraic structures, coding theory, and cryptography. Boca Raton, FL: CRC Press (2020; Zbl 1420.05002) Full Text: DOI
Davarzani, Mahmood Visual cryptography scheme on graphs with \(m^*(G)=4\). (English) Zbl 07276677 Trans. Comb. 8, No. 2, 53-66 (2019). MSC: 94A62 94A15 PDF BibTeX XML Cite \textit{M. Davarzani}, Trans. Comb. 8, No. 2, 53--66 (2019; Zbl 07276677) Full Text: DOI
Tezuka, Masayuki; Su, Xiangyu; Tanaka, Keisuke A \(t\)-out-of-\(n\) redactable signature scheme. (English) Zbl 07222968 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-31577-1/pbk; 978-3-030-31578-8/ebook). Lecture Notes in Computer Science 11829, 470-489 (2019). MSC: 94A62 05C60 PDF BibTeX XML Cite \textit{M. Tezuka} et al., Lect. Notes Comput. Sci. 11829, 470--489 (2019; Zbl 07222968) Full Text: DOI
Xu, Zifeng; Zhou, Fucai; Li, Yuxi; Xu, Jian; Wang, Qiang Privacy-preserving subgraph matching protocol for two parties. (English) Zbl 1435.68084 Int. J. Found. Comput. Sci. 30, No. 4, 571-588 (2019). MSC: 68P27 68P05 68R10 94A62 PDF BibTeX XML Cite \textit{Z. Xu} et al., Int. J. Found. Comput. Sci. 30, No. 4, 571--588 (2019; Zbl 1435.68084) Full Text: DOI
Harsányi, Károly; Ligeti, Péter Exact information ratios for secret sharing on small graphs with girth at least 5. (English) Zbl 1443.94092 J. Math. Cryptol. 13, No. 2, 107-116 (2019). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{K. Harsányi} and \textit{P. Ligeti}, J. Math. Cryptol. 13, No. 2, 107--116 (2019; Zbl 1443.94092) Full Text: DOI
Bento, Lucila M. S.; Boccardo, Davidson R.; Machado, Raphael C. S.; Pereira de Sá, Vinícius G.; Szwarcfiter, Jayme L. Full characterization of a class of graphs tailored for software watermarking. (English) Zbl 1421.68107 Algorithmica 81, No. 7, 2899-2916 (2019). MSC: 68R10 68N99 68P25 68W40 94A62 PDF BibTeX XML Cite \textit{L. M. S. Bento} et al., Algorithmica 81, No. 7, 2899--2916 (2019; Zbl 1421.68107) Full Text: DOI
Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin Efficient quantum multi-proxy signature. (English) Zbl 1409.81038 Quantum Inf. Process. 18, No. 2, Paper No. 53, 9 p. (2019). MSC: 81P94 94A60 94A62 81P40 05C82 PDF BibTeX XML Cite \textit{H. Qin} et al., Quantum Inf. Process. 18, No. 2, Paper No. 53, 9 p. (2019; Zbl 1409.81038) Full Text: DOI
Li, Jiawei; Guo, Ying Fingerprint-based quantum authentication scheme using encoded graph states. (English) Zbl 1416.81042 Int. J. Theor. Phys. 57, No. 10, 3271-3283 (2018). MSC: 81P45 81P94 94A62 05C90 PDF BibTeX XML Cite \textit{J. Li} and \textit{Y. Guo}, Int. J. Theor. Phys. 57, No. 10, 3271--3283 (2018; Zbl 1416.81042) Full Text: DOI
Vojković, Tanja; Vukičević, Damir; Zlatić, Vinko Multicoloring of graphs to secure a secret. (English) Zbl 1403.05147 Rad Hrvat. Akad. Znan. Umjet. 534, Mat. Znan. 22, 1-22 (2018). MSC: 05C82 05C15 94A62 PDF BibTeX XML Cite \textit{T. Vojković} et al., Rad Hrvat. Akad. Znan. Umjet., Mat. Znan. 534(22), 1--22 (2018; Zbl 1403.05147) Full Text: DOI arXiv
Liang, Jian-Wu; Liu, Xiao-Shu; Shi, Jin-Jing; Guo, Ying Multiparty quantum blind signature scheme based on graph states. (English) Zbl 1401.81043 Int. J. Theor. Phys. 57, No. 8, 2404-2414 (2018). MSC: 81P94 94A62 81Q35 PDF BibTeX XML Cite \textit{J.-W. Liang} et al., Int. J. Theor. Phys. 57, No. 8, 2404--2414 (2018; Zbl 1401.81043) Full Text: DOI
Wang, Hongyu; Li, Zepeng; Xu, Jin The cryptography models designed by double odd labelling of trees. (English) Zbl 1401.94178 Util. Math. 106, 223-232 (2018). MSC: 94A60 05C78 94A62 94C15 PDF BibTeX XML Cite \textit{H. Wang} et al., Util. Math. 106, 223--232 (2018; Zbl 1401.94178)
Chen, Zhou; Cheng, Yukun; Deng, Xiaotie; Qi, Qi; Yan, Xiang Limiting user’s Sybil attack in resource sharing. (English) Zbl 1405.91272 Devanur, Nikhil R. (ed.) et al., Web and internet economics. 13th international conference, WINE 2017, Bangalore, India, December 17–20, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71923-8/pbk; 978-3-319-71924-5/ebook). Lecture Notes in Computer Science 10660, 103-119 (2017). MSC: 91B32 68M11 94A62 05C90 PDF BibTeX XML Cite \textit{Z. Chen} et al., Lect. Notes Comput. Sci. 10660, 103--119 (2017; Zbl 1405.91272) Full Text: DOI
Wang, Junli; Liu, Xianhui; Guan, Min Differential privacy protection based generation model of social network publication graph. (Chinese. English summary) Zbl 1399.91079 J. Tongji Univ., Nat. Sci. 45, No. 8, 1227-1232 (2017). MSC: 91D30 05C90 94A62 PDF BibTeX XML Cite \textit{J. Wang} et al., J. Tongji Univ., Nat. Sci. 45, No. 8, 1227--1232 (2017; Zbl 1399.91079) Full Text: DOI
Lu, Hui-Chuan; Fu, Hung-Lin The optimal average information ratio of secret-sharing schemes for the access structures based on unicycle graphs and bipartite graphs. (English) Zbl 1372.05114 Discrete Appl. Math. 233, 131-142 (2017). MSC: 05C38 05C99 94A62 94A15 PDF BibTeX XML Cite \textit{H.-C. Lu} and \textit{H.-L. Fu}, Discrete Appl. Math. 233, 131--142 (2017; Zbl 1372.05114) Full Text: DOI
Yang, Yiting; Zhang, Yiwei; Ge, Gennian New lower bounds for secure codes and related hash families: a hypergraph theoretical approach. (English) Zbl 1366.94569 IEEE Trans. Inf. Theory 63, No. 4, 2446-2453 (2017). MSC: 94A62 94C15 05C65 PDF BibTeX XML Cite \textit{Y. Yang} et al., IEEE Trans. Inf. Theory 63, No. 4, 2446--2453 (2017; Zbl 1366.94569) Full Text: DOI
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying Graph state-based quantum authentication scheme. (English) Zbl 1362.81025 Int. J. Mod. Phys. B 31, No. 9, Article ID 1750067, 10 p. (2017). MSC: 81P68 81P94 PDF BibTeX XML Cite \textit{L. Liao} et al., Int. J. Mod. Phys. B 31, No. 9, Article ID 1750067, 10 p. (2017; Zbl 1362.81025) Full Text: DOI
Cheng, Minquan; Fu, Hung-Lin; Jiang, Jing; Lo, Yuan-Hsun; Miao, Ying Codes with the identifiable parent property for multimedia fingerprinting. (English) Zbl 1379.94051 Des. Codes Cryptography 83, No. 1, 71-82 (2017). MSC: 94A62 94B25 PDF BibTeX XML Cite \textit{M. Cheng} et al., Des. Codes Cryptography 83, No. 1, 71--82 (2017; Zbl 1379.94051) Full Text: DOI arXiv
Hadian Dehkordi, Massoud; Safi, Ali The complexity of the connected graph access structure on seven participants. (English) Zbl 1405.68247 J. Math. Cryptol. 11, No. 1, 25-35 (2017). MSC: 68R10 94A62 PDF BibTeX XML Cite \textit{M. Hadian Dehkordi} and \textit{A. Safi}, J. Math. Cryptol. 11, No. 1, 25--35 (2017; Zbl 1405.68247) Full Text: DOI
Ziatdinov, M. From graphs to keyed quantum hash functions. (English) Zbl 1369.94574 Lobachevskii J. Math. 37, No. 6, 705-712 (2016). MSC: 94A60 05C75 05C90 PDF BibTeX XML Cite \textit{M. Ziatdinov}, Lobachevskii J. Math. 37, No. 6, 705--712 (2016; Zbl 1369.94574) Full Text: DOI
Bhattacharya, Bhaswar B. Collision times in multicolor urn models and sequential graph coloring with applications to discrete logarithms. (English) Zbl 1356.05045 Ann. Appl. Probab. 26, No. 6, 3286-3318 (2016). MSC: 05C15 60F05 94A62 60G55 PDF BibTeX XML Cite \textit{B. B. Bhattacharya}, Ann. Appl. Probab. 26, No. 6, 3286--3318 (2016; Zbl 1356.05045) Full Text: DOI Euclid arXiv
Beimel, Amos; Farràs, Oriol; Mintz, Yuval Secret-sharing schemes for very dense graphs. (English) Zbl 1355.94047 J. Cryptology 29, No. 2, 336-362 (2016). MSC: 94A62 05C42 PDF BibTeX XML Cite \textit{A. Beimel} et al., J. Cryptology 29, No. 2, 336--362 (2016; Zbl 1355.94047) Full Text: DOI
Cai, Jin-Yi; Lu, Pinyan Erratum to: “Signature theory in holographic algorithms”. (English) Zbl 1339.68300 Algorithmica 74, No. 4, 1473-1476 (2016). MSC: 68W01 05B30 68Q25 68R05 68R10 94A62 PDF BibTeX XML Cite \textit{J.-Y. Cai} and \textit{P. Lu}, Algorithmica 74, No. 4, 1473--1476 (2016; Zbl 1339.68300) Full Text: DOI
Chen, Shangdi; Wei, Huihui Key pre-distribution schemes based on symplectic geometry for wireless sensor networks. (English) Zbl 1363.05240 Ars Comb. 121, 97-112 (2015). MSC: 05C82 05C90 05B25 11E57 94A60 94A62 PDF BibTeX XML Cite \textit{S. Chen} and \textit{H. Wei}, Ars Comb. 121, 97--112 (2015; Zbl 1363.05240)
Nan, Jizhu; Guo, Jun; Gao, Suogang Subspaces in \(d\)-bounded distance-regular graphs and authentication code with perfect secrecy. (English) Zbl 1349.05339 Ars Comb. 119, 33-45 (2015). MSC: 05E30 94B25 PDF BibTeX XML Cite \textit{J. Nan} et al., Ars Comb. 119, 33--45 (2015; Zbl 1349.05339)
Guo, Sicen; Li, Minming; Zhao, Yingchao Optimal trees for minimizing average individual updating cost. (English) Zbl 1333.94057 Theor. Comput. Sci. 607, Part 3, 272-281 (2015). MSC: 94A62 05C05 05C90 PDF BibTeX XML Cite \textit{S. Guo} et al., Theor. Comput. Sci. 607, Part 3, 272--281 (2015; Zbl 1333.94057) Full Text: DOI
Gravier, Sylvain; Javelle, Jérôme; Mhalla, Mehdi; Perdrix, Simon On weak odd domination and graph-based quantum secret sharing. (English) Zbl 1329.68118 Theor. Comput. Sci. 598, 129-137 (2015). MSC: 68Q12 05C69 05C85 94A62 PDF BibTeX XML Cite \textit{S. Gravier} et al., Theor. Comput. Sci. 598, 129--137 (2015; Zbl 1329.68118) Full Text: DOI
Csirmaz, László Secret sharing on the \(d\)-dimensional cube. (English) Zbl 1342.94106 Des. Codes Cryptography 74, No. 3, 719-729 (2015). MSC: 94A62 94A17 68R10 PDF BibTeX XML Cite \textit{L. Csirmaz}, Des. Codes Cryptography 74, No. 3, 719--729 (2015; Zbl 1342.94106) Full Text: DOI arXiv
Cheng, Minquan; Fu, Hung-Lin; Jiang, Jing; Lo, Yuan-Hsun; Miao, Ying New bounds on \(\bar{2}\)-separable codes of length 2. (English) Zbl 1351.94091 Des. Codes Cryptography 74, No. 1, 31-40 (2015). MSC: 94B25 94A62 05B40 05C51 05B25 PDF BibTeX XML Cite \textit{M. Cheng} et al., Des. Codes Cryptography 74, No. 1, 31--40 (2015; Zbl 1351.94091) Full Text: DOI
Guo, Sicen; Li, Minming; Zhao, Yingchao Optimal trees for minimizing average individual updating cost. (English) Zbl 1333.94056 Zhang, Zhao (ed.) et al., Combinatorial optimization and applications. 8th international conference, COCOA 2014, Wailea, Maui, HI, USA, December 19–21, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12690-6/pbk; 978-3-319-12691-3/ebook). Lecture Notes in Computer Science 8881, 366-378 (2014). MSC: 94A62 05C05 05C90 PDF BibTeX XML Cite \textit{S. Guo} et al., Lect. Notes Comput. Sci. 8881, 366--378 (2014; Zbl 1333.94056) Full Text: DOI
Kammerdiner, Alla R. Statistical techniques for assessing cyberspace security. (English) Zbl 1330.94056 Vogiatzis, Chrysafis (ed.) et al., Dynamics of information systems. Computational and mathematical challenges. Contributions based on the presentations at the 5th international conference, Gainesville, FL, USA, February 25–27, 2013. Cham: Springer (ISBN 978-3-319-10045-6/hbk; 978-3-319-10046-3/ebook). Springer Proceedings in Mathematics & Statistics 105, 161-177 (2014). MSC: 94A62 05C90 62F03 62P30 PDF BibTeX XML Cite \textit{A. R. Kammerdiner}, in: Dynamics of information systems. Computational and mathematical challenges. Contributions based on the presentations at the 5th international conference, Gainesville, FL, USA, February 25--27, 2013. Cham: Springer. 161--177 (2014; Zbl 1330.94056) Full Text: DOI
Li, Zhihui; Yang, Lijie The optimal information rate of a class of access structures based on hypergraphs on seven participants. (Chinese. English summary) Zbl 1313.94057 J. Shaanxi Norm. Univ., Nat. Sci. Ed. 42, No. 1, 1-6 (2014). MSC: 94A62 68P25 05C90 05C65 PDF BibTeX XML Cite \textit{Z. Li} and \textit{L. Yang}, J. Shaanxi Norm. Univ., Nat. Sci. Ed. 42, No. 1, 1--6 (2014; Zbl 1313.94057)
Raju, S. V. Siva Rama; Rao, I. H. Nagaraja Semi-complementary graphs. (English) Zbl 1301.05254 Thai J. Math. 12, No. 1, 175-183 (2014). MSC: 05C69 94A60 94A62 PDF BibTeX XML Cite \textit{S. V. S. R. Raju} and \textit{I. H. N. Rao}, Thai J. Math. 12, No. 1, 175--183 (2014; Zbl 1301.05254) Full Text: Link
Lu, Hui-Chuan; Fu, Hung-Lin The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures. (English) Zbl 1321.94109 Des. Codes Cryptography 73, No. 1, 37-46 (2014). MSC: 94A62 94A17 05C70 PDF BibTeX XML Cite \textit{H.-C. Lu} and \textit{H.-L. Fu}, Des. Codes Cryptography 73, No. 1, 37--46 (2014; Zbl 1321.94109) Full Text: DOI
Gao, Ying; dela Cruz, Romar Secret sharing schemes based on graphical codes. (English) Zbl 1294.94103 Cryptogr. Commun. 6, No. 2, 137-155 (2014). MSC: 94B05 94A62 PDF BibTeX XML Cite \textit{Y. Gao} and \textit{R. dela Cruz}, Cryptogr. Commun. 6, No. 2, 137--155 (2014; Zbl 1294.94103) Full Text: DOI
Marin, Anne; Markham, Damian; Perdrix, Simon Access structure in graphs in high dimension and application to secret sharing. (English) Zbl 1356.81121 Severini, Simone (ed.) et al., 8th conference on the theory of quantum computation, communication and cryptography, TQC 2013, Guelph, Canada, May 21–23, 2013. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-55-2). LIPIcs – Leibniz International Proceedings in Informatics 22, 308-324 (2013). MSC: 81P94 94A62 PDF BibTeX XML Cite \textit{A. Marin} et al., LIPIcs -- Leibniz Int. Proc. Inform. 22, 308--324 (2013; Zbl 1356.81121) Full Text: DOI
Abdullah, Herish O.; Eftekhari, Mohammad Cryptanalysis and improvements on some graph-based authentication schemes. (English) Zbl 1348.94027 J. Discrete Math. Sci. Cryptography 16, No. 4-5, 297-306 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{H. O. Abdullah} and \textit{M. Eftekhari}, J. Discrete Math. Sci. Cryptography 16, No. 4--5, 297--306 (2013; Zbl 1348.94027) Full Text: DOI
Javelle, Jérôme; Mhalla, Mehdi; Perdrix, Simon New protocols and lower bounds for quantum secret sharing with graph states. (English) Zbl 1451.81207 Iwama, Kazuo (ed.) et al., Theory of quantum computation, communication, and cryptography. 7th conference, TQC 2012, Tokyo, Japan, May 17–19, 2012. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7582, 1-12 (2013). MSC: 81P94 94A62 PDF BibTeX XML Cite \textit{J. Javelle} et al., Lect. Notes Comput. Sci. 7582, 1--12 (2013; Zbl 1451.81207) Full Text: DOI
Arumugam, S.; Lakshmanan, R.; Nagar, Atulya K. Graph access structures with optimal pixel expansion three. (English) Zbl 1433.94099 Inf. Comput. 230, 67-75 (2013). MSC: 94A62 05C90 94A60 PDF BibTeX XML Cite \textit{S. Arumugam} et al., Inf. Comput. 230, 67--75 (2013; Zbl 1433.94099) Full Text: DOI
Bento, Lucila Maria Souza; Boccardo, Davidson; Machado, Raphael Carlos Santos; Pereira de Sá, Vinícius Gusmão; Szwarcfiter, Jayme Luiz Towards a provably resilient scheme for graph-based watermarking. (English) Zbl 1417.94093 Brandstädt, Andreas (ed.) et al., Graph-theoretic concepts in computer science. 39th international workshop, WG 2013, Lübeck, Germany, June 19–21, 2013. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 8165, 50-63 (2013). MSC: 94A62 05C78 05C85 68Q25 PDF BibTeX XML Cite \textit{L. M. S. Bento} et al., Lect. Notes Comput. Sci. 8165, 50--63 (2013; Zbl 1417.94093) Full Text: DOI
Farràs, Oriol; Padró, Carles Ideal hierarchical secret sharing schemes. (English) Zbl 1365.94479 IEEE Trans. Inf. Theory 58, No. 5, 3273-3286 (2012). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{O. Farràs} and \textit{C. Padró}, IEEE Trans. Inf. Theory 58, No. 5, 3273--3286 (2012; Zbl 1365.94479) Full Text: DOI
Yağan, Osman Performance of the Eschenauer-Gligor key distribution scheme under an ON/OFF channel. (English) Zbl 1365.94493 IEEE Trans. Inf. Theory 58, No. 6, 3821-3835 (2012). MSC: 94A62 94A05 05C80 60C05 PDF BibTeX XML Cite \textit{O. Yağan}, IEEE Trans. Inf. Theory 58, No. 6, 3821--3835 (2012; Zbl 1365.94493) Full Text: DOI arXiv
Romańczuk, Urszula; Ustimenko, Vasyl On families of graphs of large cycle indicator, matrices of large order and key exchange protocols with nonlinear polynomial maps of small degree. (English) Zbl 1262.68191 Math. Comput. Sci. 6, No. 2, 167-180 (2012). MSC: 68W30 94A62 15B33 05C50 05C85 11T71 PDF BibTeX XML Cite \textit{U. Romańczuk} and \textit{V. Ustimenko}, Math. Comput. Sci. 6, No. 2, 167--180 (2012; Zbl 1262.68191) Full Text: DOI
Lin, Jingqiang; Liu, Peng; Jing, Jiwu Using signaling games to model the multi-step attack-defense scenarios on confidentiality. (English) Zbl 1284.91093 Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 118-137 (2012). MSC: 91A80 94A62 91A28 PDF BibTeX XML Cite \textit{J. Lin} et al., Lect. Notes Comput. Sci. 7638, 118--137 (2012; Zbl 1284.91093) Full Text: DOI
Indo, Yoshihiro; Mizuki, Takaaki; Nishizeki, Takao Absolutely secure message transmission using a key sharing graph. (English) Zbl 1257.68065 Discrete Math. Algorithms Appl. 4, No. 4, Paper No. 1250053, 15 p. (2012). MSC: 68P30 68P25 68R10 05C40 05C38 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Indo} et al., Discrete Math. Algorithms Appl. 4, No. 4, Paper No. 1250053, 15 p. (2012; Zbl 1257.68065) Full Text: DOI
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih Graph coloring applied to secure computation in non-abelian groups. (English) Zbl 1278.94046 J. Cryptology 25, No. 4, 557-600 (2012). MSC: 94A60 05C15 20F99 68M12 68P25 94A62 PDF BibTeX XML Cite \textit{Y. Desmedt} et al., J. Cryptology 25, No. 4, 557--600 (2012; Zbl 1278.94046) Full Text: DOI
Csirmaz, László; Tardos, Gábor On-line secret sharing. (English) Zbl 1236.05195 Des. Codes Cryptography 63, No. 1, 127-147 (2012). MSC: 94A62 05C65 05C85 68W27 PDF BibTeX XML Cite \textit{L. Csirmaz} and \textit{G. Tardos}, Des. Codes Cryptography 63, No. 1, 127--147 (2012; Zbl 1236.05195) Full Text: DOI arXiv
Romańczuk, Urszula; Ustimenko, Vasyl On the key exchange with new cubical maps based on graphs. (English) Zbl 1283.94103 Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 11, No. 4, 11-19 (2011). MSC: 94A62 68W30 05C90 PDF BibTeX XML Cite \textit{U. Romańczuk} and \textit{V. Ustimenko}, Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 11, No. 4, 11--19 (2011; Zbl 1283.94103) Full Text: DOI
Ustimenko, Vasyl; Wróblewska, Aneta On the key expansion of \(D(n, K)\)-based cryptographical algorithm. (English) Zbl 1284.94120 Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 11, No. 2, 95-111 (2011). MSC: 94A60 05C90 05C25 94A62 PDF BibTeX XML Cite \textit{V. Ustimenko} and \textit{A. Wróblewska}, Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 11, No. 2, 95--111 (2011; Zbl 1284.94120) Full Text: DOI
Cai, Jin-Yi; Lu, Pinyan Signature theory in holographic algorithms. (English) Zbl 1238.68184 Algorithmica 61, No. 4, 779-816 (2011); erratum ibid. 74, No. 4, 1473-1476 (2016). Reviewer: Ioan Tomescu (Bucureşti) MSC: 68W01 05B30 68Q25 68R05 68R10 94A62 PDF BibTeX XML Cite \textit{J.-Y. Cai} and \textit{P. Lu}, Algorithmica 61, No. 4, 779--816 (2011; Zbl 1238.68184) Full Text: DOI
Wang, Kaishun; Guo, Jun; Li, Fenggao Singular linear space and its applications. (English) Zbl 1234.51008 Finite Fields Appl. 17, No. 5, 395-406 (2011). Reviewer: Nan Ji-Zhu (Dalian) MSC: 51E30 05E30 20G40 05C25 94A62 PDF BibTeX XML Cite \textit{K. Wang} et al., Finite Fields Appl. 17, No. 5, 395--406 (2011; Zbl 1234.51008) Full Text: DOI
Mizuki, Takaaki; Nakayama, Satoru; Sone, Hideaki An application of st-numbering to secret key agreement. (English) Zbl 1222.68037 Int. J. Found. Comput. Sci. 22, No. 5, 1211-1227 (2011). MSC: 68M12 68R10 91A80 94A62 PDF BibTeX XML Cite \textit{T. Mizuki} et al., Int. J. Found. Comput. Sci. 22, No. 5, 1211--1227 (2011; Zbl 1222.68037) Full Text: DOI
Piekarczyk, Marcin; Ogiela, Marek R. Hierarchical graph-grammar model for secure and efficient handwritten signatures classification. (English) Zbl 1217.68197 J. UCS 17, No. 6, 926-943 (2011). MSC: 68T10 68R10 68U10 PDF BibTeX XML Cite \textit{M. Piekarczyk} and \textit{M. R. Ogiela}, J. UCS 17, No. 6, 926--943 (2011; Zbl 1217.68197) Full Text: Link
Goodrich, Michael T.; Tamassia, Roberto; Triandopoulos, Nikos Efficient authenticated data structures for graph connectivity and geometric search problems. (English) Zbl 1218.68081 Algorithmica 60, No. 3, 505-552 (2011). MSC: 68P30 68P05 05C40 94A60 PDF BibTeX XML Cite \textit{M. T. Goodrich} et al., Algorithmica 60, No. 3, 505--552 (2011; Zbl 1218.68081) Full Text: DOI
Bläser, Markus; Jakoby, Andreas; Liśkiewicz, Maciej; Manthey, Bodo Privacy in non-private environments. (English) Zbl 1208.94038 Theory Comput. Syst. 48, No. 1, 211-245 (2011). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. Bläser} et al., Theory Comput. Syst. 48, No. 1, 211--245 (2011; Zbl 1208.94038) Full Text: DOI
Ma, Jianmin; Guo, Jun; Li, Fenggao; Wang, Kaishun A generalization of the formulas for intersection numbers of dual polar association schemes and their applications. (English) Zbl 1223.05307 Linear Algebra Appl. 434, No. 5, 1272-1284 (2011). Reviewer: Nicola Pace (Boca Raton) MSC: 05E30 20G40 94A62 05C25 PDF BibTeX XML Cite \textit{J. Ma} et al., Linear Algebra Appl. 434, No. 5, 1272--1284 (2011; Zbl 1223.05307) Full Text: DOI
Nitinawarat, Sirin; Narayan, Prakash Perfect omniscience, perfect secrecy, and Steiner tree packing. (English) Zbl 1366.94563 IEEE Trans. Inf. Theory 56, No. 12, 6490-6500 (2010). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{S. Nitinawarat} and \textit{P. Narayan}, IEEE Trans. Inf. Theory 56, No. 12, 6490--6500 (2010; Zbl 1366.94563) Full Text: DOI arXiv
Gong, Zheng; Huang, Zheng; Qiu, Weidong; Chen, Kefei Transitive signature scheme from LFSR. (English) Zbl 1238.94033 JISE, J. Inf. Sci. Eng. 26, No. 1, 131-143 (2010). MSC: 94A62 PDF BibTeX XML Cite \textit{Z. Gong} et al., JISE, J. Inf. Sci. Eng. 26, No. 1, 131--143 (2010; Zbl 1238.94033)
Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef Decomposition construction for secret sharing schemes with graph access structures in polynomial time. (English) Zbl 1213.94137 SIAM J. Discrete Math. 24, No. 2, 617-638 (2010). Reviewer: Vladimír Lacko (Košice) MSC: 94A60 94A62 90C05 54C70 05C20 PDF BibTeX XML Cite \textit{H.-M. Sun} et al., SIAM J. Discrete Math. 24, No. 2, 617--638 (2010; Zbl 1213.94137) Full Text: DOI
Csirmaz, László Corrigendum to: Secret sharing on infinite graphs. (English) Zbl 1287.94108 Tatra Mt. Math. Publ. 47, 137-138 (2010). MSC: 94A62 05C90 68P25 PDF BibTeX XML Cite \textit{L. Csirmaz}, Tatra Mt. Math. Publ. 47, 137--138 (2010; Zbl 1287.94108) Full Text: DOI Link
Narayan, Prakash Multiterminal secrecy generation and tree packing. (English) Zbl 1282.94080 Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 127 (2010). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{P. Narayan}, Lect. Notes Comput. Sci. 5973, 127 (2010; Zbl 1282.94080) Full Text: DOI
Stokes, Klara; Bras-Amorós, Maria Optimal configurations for peer-to-peer user-private information retrieval. (English) Zbl 1189.05169 Comput. Math. Appl. 59, No. 4, 1568-1577 (2010). MSC: 05C90 68M10 05B25 68P15 94A62 PDF BibTeX XML Cite \textit{K. Stokes} and \textit{M. Bras-Amorós}, Comput. Math. Appl. 59, No. 4, 1568--1577 (2010; Zbl 1189.05169) Full Text: DOI
Belim, S. V.; Belim, S. Yu.; Bogachenko, N. F. Graph-theoretic analysis of the role security policy. (Russian) Zbl 1265.94066 Mat. Strukt. Model. 19, 85-96 (2009). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{S. V. Belim} et al., Mat. Strukt. Model. 19, 85--96 (2009; Zbl 1265.94066) Full Text: Link
Herranz, J. Ideal homogeneous access structures constructed from graphs. (English) Zbl 1217.94118 J. UCS 15, No. 14, 2881-2893 (2009). MSC: 94A62 05C40 05C90 PDF BibTeX XML Cite \textit{J. Herranz}, J. UCS 15, No. 14, 2881--2893 (2009; Zbl 1217.94118) Full Text: Link
Bandinelli, Matteo; Paganelli, Federica; Vannuccini, Gianluca; Giuli, Dino A context-aware security framework for next generation mobile networks. (English) Zbl 1184.90031 Schmidt, Andreas U. (ed.) et al., Security and privacy in mobile information and communication systems. First international ICST conference, MoboSec 2009, Turin, Italy, June 3–5, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04433-5/pbk; 978-3-642-04434-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 17, 134-147 (2009). MSC: 90B18 68P25 94A62 PDF BibTeX XML Cite \textit{M. Bandinelli} et al., Lect. Notes Comput. Sci. Soc.-Inform. Telecommun. Eng. 17, 134--147 (2009; Zbl 1184.90031) Full Text: DOI
Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won Integrating fingerprint verification into the smart card-based healthcare information system. (English) Zbl 1184.94257 EURASIP J. Adv. Signal Process. 2009, Article ID 845893, 12 p. (2009). MSC: 94A62 94C15 PDF BibTeX XML Cite \textit{D. Moon} et al., EURASIP J. Adv. Signal Process. 2009, Article ID 845893, 12 p. (2009; Zbl 1184.94257) Full Text: DOI
Cai, Jin-Yi; Lu, Pinyan Holographic algorithms with unsymmetric signatures. (English) Zbl 1192.68474 Proceedings of the nineteenth annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, January 20–22, 2008. New York, NY: Association for Computing Machinery (ACM); Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 978-0-898716-47-4). 54-63 (2008). MSC: 68R10 68Q25 68W40 94A62 PDF BibTeX XML Cite \textit{J.-Y. Cai} and \textit{P. Lu}, in: Proceedings of the nineteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2008, San Francisco, CA, January 20--22, 2008. New York, NY: Association for Computing Machinery (ACM); Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM). 54--63 (2008; Zbl 1192.68474)
Csirmaz, László Secret sharing on infinite graphs. (English) Zbl 1240.68089 Tatra Mt. Math. Publ. 41, 1-18 (2008); corrigendum ibid. 47, 137-138 (2010). MSC: 94A62 05C90 68P25 PDF BibTeX XML Cite \textit{L. Csirmaz}, Tatra Mt. Math. Publ. 41, 1--18 (2008; Zbl 1240.68089) Full Text: Link
Jeong, I. R.; Lee, D. H. Parallel key exchange. (English) Zbl 1217.94119 J. UCS 14, No. 3, 377-396 (2008). MSC: 94A62 68M12 PDF BibTeX XML Cite \textit{I. R. Jeong} and \textit{D. H. Lee}, J. UCS 14, No. 3, 377--396 (2008; Zbl 1217.94119) Full Text: Link
Blin, Lélia; Fraigniaud, Pierre; Nisse, Nicolas; Vial, Sandrine Distributed chasing of network intruders. (English) Zbl 1146.68013 Theor. Comput. Sci. 399, No. 1-2, 12-37 (2008). MSC: 68M10 68M12 68R10 68T20 68W15 94A62 PDF BibTeX XML Cite \textit{L. Blin} et al., Theor. Comput. Sci. 399, No. 1--2, 12--37 (2008; Zbl 1146.68013) Full Text: DOI
Gao, Suogang; Guo, Jun; Zhang, Baohuan; Fu, Lihui Subspaces in \(d\)-bounded distance-regular graphs and their applications. (English) Zbl 1146.05020 Eur. J. Comb. 29, No. 3, 592-600 (2008). Reviewer: Ján Plesník (Bratislava) MSC: 05C12 05E30 PDF BibTeX XML Cite \textit{S. Gao} et al., Eur. J. Comb. 29, No. 3, 592--600 (2008; Zbl 1146.05020) Full Text: DOI
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong On secure multi-party computation in black-box groups. (English) Zbl 1215.94042 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 591-612 (2007). MSC: 94A60 05C15 68M12 68Q10 68Q25 94A62 PDF BibTeX XML Cite \textit{Y. Desmedt} et al., Lect. Notes Comput. Sci. 4622, 591--612 (2007; Zbl 1215.94042) Full Text: DOI
Raidl, Günther R.; Chwatal, Andreas Fingerprint template compression by solving a minimum label \(k\)-node subtree problem. (English) Zbl 1152.05385 Simos, Theodore E. (ed.) et al., Numerical analysis and applied mathematics. International conference of numerical analysis and applied mathematics, Corfu, Greece, 16–20 September 2007. Melville, NY: American Institute of Physics (AIP) (ISBN 978-0-7354-0447-2/hbk). AIP Conference Proceedings 936, 444-447 (2007). MSC: 05C99 05-04 94A62 PDF BibTeX XML Cite \textit{G. R. Raidl} and \textit{A. Chwatal}, AIP Conf. Proc. 936, 444--447 (2007; Zbl 1152.05385) Full Text: DOI
Ustimenko, V. A. On graph-based cryptography and symbolic computations. (English) Zbl 1256.94067 Serdica J. Comput. 1, No. 2, 131-156 (2007). MSC: 94A60 05C20 05C82 05C90 68W30 94A62 PDF BibTeX XML Cite \textit{V. A. Ustimenko}, Serdica J. Comput. 1, No. 2, 131--156 (2007; Zbl 1256.94067) Full Text: EuDML
Graham, Ronald L.; Li, Minming; Yao, Frances F. Optimal tree structures for group key management with batch updates. (English) Zbl 1139.05014 SIAM J. Discrete Math. 21, No. 2, 532-547 (2007). MSC: 05C05 05C85 68M10 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{R. L. Graham} et al., SIAM J. Discrete Math. 21, No. 2, 532--547 (2007; Zbl 1139.05014) Full Text: DOI
Ustimenko, V. A. On the extremal graph theory for directed graphs and its cryptographical applications. (English) Zbl 1140.05039 Shaska, T. (ed.) et al., Advances in coding theory and cryptography. Selected papers based on the presentations at the Vlora conference in coding theory and cryptography, Vlora, Albania, May 26–27, 2007 and a special session on coding theory as part of the applications of computer algebra conference, Rochester, MI, USA, July 19–22, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-270-701-7/hbk). Series on Coding Theory and Cryptology 3, 181-199 (2007). Reviewer: Herman J. Tiersma (Den Haag) MSC: 05C35 05C20 94A60 94A62 PDF BibTeX XML Cite \textit{V. A. Ustimenko}, in: Advances in coding theory and cryptography. Selected papers based on the presentations at the Vlora conference in coding theory and cryptography, Vlora, Albania, May 26--27, 2007 and a special session on coding theory as part of the applications of computer algebra conference, Rochester, MI, USA, July 19--22, 2007. Hackensack, NJ: World Scientific. 181--199 (2007; Zbl 1140.05039)
Donets, G. A.; Zhang, Bin Problems on mathematical safes on graphs. (English. Russian original) Zbl 1117.68055 Cybern. Syst. Anal. 42, No. 5, 624-630 (2006); translation from Kibern. Sist. Anal. 42, No. 5, 14-21 (2006). MSC: 68R10 05A05 94A62 PDF BibTeX XML Cite \textit{G. A. Donets} and \textit{B. Zhang}, Cybern. Syst. Anal. 42, No. 5, 624--630 (2006; Zbl 1117.68055); translation from Kibern. Sist. Anal. 42, No. 5, 14--21 (2006) Full Text: DOI
De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara Unconditionally secure key assignment schemes. (English) Zbl 1091.94030 Discrete Appl. Math. 154, No. 2, 234-252 (2006). MSC: 94A62 94A17 05C99 PDF BibTeX XML Cite \textit{A. De Santis} et al., Discrete Appl. Math. 154, No. 2, 234--252 (2006; Zbl 1091.94030) Full Text: DOI
Hatano, Yuko; Mesbahi, Mehran Agreement over random networks. (English) Zbl 1365.94482 IEEE Trans. Autom. Control 50, No. 11, 1867-1872 (2005). MSC: 94A62 60C05 05C80 93E15 PDF BibTeX XML Cite \textit{Y. Hatano} and \textit{M. Mesbahi}, IEEE Trans. Autom. Control 50, No. 11, 1867--1872 (2005; Zbl 1365.94482) Full Text: DOI
Abuein, Qusai; Shibusawa, Susumu A graph-based new amortization scheme for multicast streams authentication. (English) Zbl 1157.94366 Adv. Model. Optim. 7, No. 2, 238-261 (2005). MSC: 94A62 68U35 PDF BibTeX XML Cite \textit{Q. Abuein} and \textit{S. Shibusawa}, Adv. Model. Optim. 7, No. 2, 238--261 (2005; Zbl 1157.94366) Full Text: Link
Brickell, Justin; Shmatikov, Vitaly Privacy-preserving graph algorithms in the semi-honest model. (English) Zbl 1154.94450 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 236-252 (2005). MSC: 94A62 05C85 68R10 PDF BibTeX XML Cite \textit{J. Brickell} and \textit{V. Shmatikov}, Lect. Notes Comput. Sci. 3788, 236--252 (2005; Zbl 1154.94450) Full Text: DOI
Desmedt, Yvo; Wang, Yongge; Safavi-Naini, Rei; Wang, Huaxiong Radio networks with reliable communication. (English) Zbl 1128.68300 Wang, Lusheng (ed.), Computing and combinatorics. 11th annual international conference, COCOON 2005, Kunming, China, August 16–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28061-8/pbk). Lecture Notes in Computer Science 3595, 156-166 (2005). MSC: 68M10 68R10 90B18 94A62 PDF BibTeX XML Cite \textit{Y. Desmedt} et al., Lect. Notes Comput. Sci. 3595, 156--166 (2005; Zbl 1128.68300) Full Text: DOI
Ge, Gennian; Miao, Ying; Wang, Lihua Combinatorial constructions for optimal splitting authentication codes. (English) Zbl 1076.94024 SIAM J. Discrete Math. 18, No. 4, 663-678 (2005). MSC: 94A62 05B05 05C70 PDF BibTeX XML Cite \textit{G. Ge} et al., SIAM J. Discrete Math. 18, No. 4, 663--678 (2005; Zbl 1076.94024) Full Text: DOI
Szydlo, Michael Merkle tree traversal in log space and time. (English) Zbl 1122.68751 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 541-554 (2004). MSC: 68W40 05C85 68Q25 PDF BibTeX XML Cite \textit{M. Szydlo}, Lect. Notes Comput. Sci. 3027, 541--554 (2004; Zbl 1122.68751) Full Text: DOI
Jiang, Qinglin; Reeves, Douglas S.; Ning, Peng Certificate recommendations to improve the robustness of web of trust. (English) Zbl 1109.68464 Zhang, Kan (ed.) et al., Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23208-7/pbk). Lecture Notes in Computer Science 3225, 292-303 (2004). MSC: 68P25 94A62 PDF BibTeX XML Cite \textit{Q. Jiang} et al., Lect. Notes Comput. Sci. 3225, 292--303 (2004; Zbl 1109.68464) Full Text: DOI
Lai, Ying-Cheng; Motter, Adilson E.; Nishikawa, Takashi Attacks and cascades in complex networks. (English) Zbl 1124.94303 Ben-Naim, Eli (ed.) et al., Complex networks. Papers from the conference ‘complex networks: structure, dynamics, and function’, 23rd annual conference of the Center for Nonlinear Studies, Santa Fe, NM, USA, May 12–16, 2003. Berlin: Springer (ISBN 3-540-22354-1/hbk). Lecture Notes in Physics 650, 299-310 (2004). MSC: 94A62 68M10 05C80 PDF BibTeX XML Cite \textit{Y.-C. Lai} et al., Lect. Notes Phys. 650, 299--310 (2004; Zbl 1124.94303)
Tô, Vu Dong; Safavi-Naini, Reihaneh On the maximal codes of length 3 with the 2-identifiable parent property. (English) Zbl 1101.68070 SIAM J. Discrete Math. 17, No. 4, 548-570 (2004). MSC: 68R10 90C27 90C47 94A62 94B25 PDF BibTeX XML Cite \textit{V. D. Tô} and \textit{R. Safavi-Naini}, SIAM J. Discrete Math. 17, No. 4, 548--570 (2004; Zbl 1101.68070) Full Text: DOI
Collberg, Christian; Kobourov, Stephen; Carter, Edward; Thomborson, Clark Error-correcting graphs for software watermarking. (English) Zbl 1255.68110 Bodlaender, Hans L. (ed.), Graph-theoretic concepts in computer science. 29th international workshop, WG 2003, Elspeet, The Netherlands, June 19–21, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20452-0/pbk). Lect. Notes Comput. Sci. 2880, 156-167 (2003). MSC: 68R10 68P25 94A62 PDF BibTeX XML Cite \textit{C. Collberg} et al., Lect. Notes Comput. Sci. 2880, 156--167 (2003; Zbl 1255.68110) Full Text: DOI
Grusho, A. A.; Timonina, E. E. Estimation of the time needed to set up a covert channel. (English. Russian original) Zbl 1047.94015 Discrete Math. Appl. 13, No. 3, 257-263 (2003); translation from Diskretn. Mat. 15, No. 2, 40-46 (2003). MSC: 94A62 94A60 68P25 05C90 PDF BibTeX XML Cite \textit{A. A. Grusho} and \textit{E. E. Timonina}, Discrete Math. Appl. 13, No. 3, 257--263 (2003; Zbl 1047.94015); translation from Diskretn. Mat. 15, No. 2, 40--46 (2003) Full Text: DOI
Armeni, S.; Christodulakis, D.; Kostopoulos, I.; Stamatiou, Y. C.; Xenos, M. Secure information hiding based on computationally intractable problems. (English) Zbl 1036.94010 J. Discrete Math. Sci. Cryptography 6, No. 1, 21-33 (2003). MSC: 94A62 68P30 94A60 05C90 05C15 PDF BibTeX XML Cite \textit{S. Armeni} et al., J. Discrete Math. Sci. Cryptography 6, No. 1, 21--33 (2003; Zbl 1036.94010) Full Text: DOI
Mizuki, Takaaki; Shizuya, Hiroki; Nishizeki, Takao Characterization of optimal key set protocols. (English) Zbl 1028.94024 Discrete Appl. Math. 131, No. 1, 213-236 (2003). MSC: 94A60 94A62 05C05 PDF BibTeX XML Cite \textit{T. Mizuki} et al., Discrete Appl. Math. 131, No. 1, 213--236 (2003; Zbl 1028.94024) Full Text: DOI
Jakobsson, Markus; Leighton, Tom; Micali, Silvio; Szydlo, Michael Fractal Merkle tree representation and traversal. (English) Zbl 1039.94526 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 314-326 (2003). MSC: 94A62 05C90 94A60 05C85 PDF BibTeX XML Cite \textit{M. Jakobsson} et al., Lect. Notes Comput. Sci. 2612, 314--326 (2003; Zbl 1039.94526) Full Text: Link
Goodrich, Michael T.; Tamassia, Roberto; Triandopoulos, Nikos; Cohen, Robert Authenticated data structures for graph and geometric searching. (English) Zbl 1039.94524 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 295-313 (2003). MSC: 94A62 94A60 05C90 PDF BibTeX XML Cite \textit{M. T. Goodrich} et al., Lect. Notes Comput. Sci. 2612, 295--313 (2003; Zbl 1039.94524) Full Text: Link
Desmedt, Yvo; Wang, Yongge Efficient zero-knowledge proofs for some practical graph problems. (English) Zbl 1022.68050 Cimato, Stelvio (ed.) et al., Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2576, 290-302 (2003). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Desmedt} and \textit{Y. Wang}, Lect. Notes Comput. Sci. 2576, 290--302 (2003; Zbl 1022.68050) Full Text: Link
Micali, Silvio; Rivest, Ronald L. Transitive signature schemes. (English) Zbl 1048.94518 Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 236-243 (2002). MSC: 94A62 05C90 94A60 PDF BibTeX XML Cite \textit{S. Micali} and \textit{R. L. Rivest}, Lect. Notes Comput. Sci. 2271, 236--243 (2002; Zbl 1048.94518) Full Text: Link
Ruan, Chun; Varadharajan, Vijay Resolving conflicts in authorization delegations. (English) Zbl 1023.94543 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 271-285 (2002). MSC: 94A62 05C85 PDF BibTeX XML Cite \textit{C. Ruan} and \textit{V. Varadharajan}, Lect. Notes Comput. Sci. 2384, 271--285 (2002; Zbl 1023.94543) Full Text: Link
Hevia, Alejandro; Micciancio, Daniele The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. (English) Zbl 1065.94563 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 379-396 (2002). MSC: 94A62 05C90 PDF BibTeX XML Cite \textit{A. Hevia} and \textit{D. Micciancio}, Lect. Notes Comput. Sci. 2501, 379--396 (2002; Zbl 1065.94563) Full Text: DOI
Caballero-Gil, Pino; Hernández-Goya, Candelaria Strong solutions to the identification problem. (English) Zbl 1004.94545 Wang, Jie (ed.), Computing and combinatorics. 7th annual international conference, COCOON 2001, Guilin, China, August 20-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2108, 257-261 (2001). MSC: 94A62 94A60 05C90 PDF BibTeX XML Cite \textit{P. Caballero-Gil} and \textit{C. Hernández-Goya}, Lect. Notes Comput. Sci. 2108, 257--261 (2001; Zbl 1004.94545) Full Text: Link
Cohen, Gérard; Encheva, Sylvia; Zémor, Gilles A hypergraph approach to digital fingerprinting. (English) Zbl 1415.94468 Rusu, Irena (ed.), Proceedings of the 6th international conference on graph theory, Marseille-Luminy, France, August 28–September 2, 2000. Amsterdam: Elsevier. Electron. Notes Discrete Math. 5, 67-70 (2000). MSC: 94A62 05C65 05C90 94A60 PDF BibTeX XML Cite \textit{G. Cohen} et al., Electron. Notes Discrete Math. 5, 67--70 (2000; Zbl 1415.94468) Full Text: Link
Burmester, Mike; Desmedt, Yvo; Doi, Hiroshi; Mambo, Masahiro; Okamoto, Eiji; Tada, Mitsuru; Yoshifuji, Yuko A structured ElGamal-type multisignature scheme. (English) Zbl 0969.94028 Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 466-483 (2000). MSC: 94A62 PDF BibTeX XML Cite \textit{M. Burmester} et al., Lect. Notes Comput. Sci. 1751, 466--483 (2000; Zbl 0969.94028)