On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2

Abstract
No abstract available

This publication has 3 references indexed in Scilit: