Author of the publication

Super-simple balanced incomplete block designs with block size 5 and index 3.

, , , and . Discrete Applied Mathematics, 161 (16-17): 2396-2404 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The existence of Schröder designs with equal-sized holes., and . Discrete Mathematics, 170 (1-3): 15-28 (1997)Indoor location based on WiFi., and . CSCWD, page 331-336. IEEE, (2015)Improving Indirect Key Management Scheme of Access Hierarchies., and . I. J. Network Security, 4 (2): 128-137 (2007)An Efficient Trust Model for Multi-Agent Systems., , , and . CSCWD, page 659-664. IEEE, (2006)Applying secret sharing schemes to service reputation., , , and . CSCWD (2), page 696-703. IEEE Computer Society, (2005)1-84600-002-5.Combinatorial properties of frameproof and traceability codes., , and . IEEE Trans. Information Theory, 47 (3): 1042-1049 (2001)The Lovász Local Lemma and Its Applications to some Combinatorial Arrays., , and . Des. Codes Cryptogr., 32 (1-3): 121-134 (2004)Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004., and . IACR Cryptology ePrint Archive, (2005)Combinatorial Constructions for Optimal Two-Dimensional Optical Orthogonal Codes., and . IEEE Trans. Information Theory, 55 (3): 1387-1394 (2009)Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures., and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 200-214. Springer, (1999)