Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 8 of 8.

Add to Quick Collection   All 8 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/118784
Description: 31 page(s)
Date: 2010
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/118777
Description: In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum k ... More
Date: 2005
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/8399
Description: In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to i ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148328
Description: Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by h ... More
Reviewed: Reviewed
Date: 2003
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245560
Description: 19 page(s)
Reviewed: Reviewed
Date: 2003
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/17938
Description: In this paper, we consider a new class of unconditionally secure authentication codes, called linear authentication codes (or linear A-codes).We show that a linear A-code can be characterized by a fam ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2002
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1232618
Description: 16 page(s)
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/6427
Description: In a traditional anti-jamming system a transmitter who wants to send a signal to a single receiver spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocki ... More
  • First
  • Previous
  • 1
  • Next
  • Last