Authentication theory and hypothesis testing
- 1 July 2000
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 46 (4) , 1350-1356
- https://doi.org/10.1109/18.850674
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Information-Theoretic Bounds for Authentication FraudsPublished by Springer Nature ,2001
- Authentication Theory/Coding TheoryPublished by Springer Nature ,2000
- Bounds on the probability of deception in multiple authenticationIEEE Transactions on Information Theory, 1994
- Lower bounds on the probability of deception in authentication with arbitrationIEEE Transactions on Information Theory, 1994
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- A lower bound on authentication after having observed a sequence of messagesJournal of Cryptology, 1993
- Strengthening Simmons' bound on impersonationIEEE Transactions on Information Theory, 1991
- Repeated use of codes which detect deception (Corresp.)IEEE Transactions on Information Theory, 1979
- Codes Which Detect DeceptionBell System Technical Journal, 1974
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949