Login / Signup
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.
Ben J. M. Smeets
Peter Vanroose
Zhe-xian Wan
Published in:
EUROCRYPT (1990)
Keyphrases
</>
wireless networks
error correction
security issues
security analysis