Last update: Sun Jun 12 03:08:01 2016
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Fung:1999:PPS,
author = "W. W. Fung and J. W. {Gray III}",
title = "On $m$-Permutation Protection Scheme against
Modification Attack",
journal = j-LECT-NOTES-COMP-SCI,
volume = "1587",
pages = "77--87",
year = "1999",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Dec 03 17:05:20 2002",
bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t1587.htm;
http://www.math.utah.edu/pub/tex/bib/lncs1999a.bib",
URL = "http://link.springer-ny.com/link/service/series/0558/bibs/1587/15870077.htm;
http://link.springer-ny.com/link/service/series/0558/papers/1587/15870077.pdf",
acknowledgement = ack-nhfb,
keywords = "ACISP; information security; privacy",
}
Related entries
- $m$,
1563(0)132
- ACISP,
1587(0)1,
1587(0)12,
1587(0)26,
1587(0)36,
1587(0)51,
1587(0)64,
1587(0)88,
1587(0)103,
1587(0)117,
1587(0)129,
1587(0)135,
1587(0)149,
1587(0)164,
1587(0)177,
1587(0)192,
1587(0)202,
1587(0)213,
1587(0)228,
1587(0)244,
1587(0)258,
1587(0)270,
1587(0)281,
1587(0)294,
1587(0)303,
1587(0)314
- against,
1548(0)502,
1556(0)264,
1558(0)50,
1560(0)204,
1592(0)90,
1592(0)255,
1592(0)311
- Attack,
1556(0)106,
1556(0)190,
1556(0)306,
1560(0)154,
1560(0)204,
1587(0)88,
1587(0)149,
1592(0)90,
1592(0)255,
1592(0)347
- information,
1509(0)258,
1509(0)269,
1509(0)276,
1509(0)285,
1509(0)296,
1540(0)31,
1540(0)332,
1551(0)275,
1552(0)117,
1552(0)266,
1562(0)209,
1565(0)44,
1565(0)65,
1565(0)105,
1565(0)168,
1565(0)281,
1566(0)133,
1566(0)166,
1571(0)189,
1574(0)138,
1574(0)252,
1576(0)40,
1577(0)22,
1579(0)z,
1580(0)55,
1585(0)50,
1587(0)1,
1587(0)12,
1587(0)26,
1587(0)36,
1587(0)51,
1587(0)64,
1587(0)88,
1587(0)103,
1587(0)117,
1587(0)129,
1587(0)135,
1587(0)149,
1587(0)164,
1587(0)177,
1587(0)192,
1587(0)202,
1587(0)213,
1587(0)228,
1587(0)244,
1587(0)258,
1587(0)270,
1587(0)281,
1587(0)294,
1587(0)303,
1587(0)314,
1592(0)402,
1593(0)959,
1597(0)446,
1599(0)118,
1599(0)118,
1599(0)133
- permutation,
1560(0)219,
1586(0)831,
1592(0)432
- privacy,
1560(0)136,
1587(0)1,
1587(0)12,
1587(0)26,
1587(0)36,
1587(0)51,
1587(0)64,
1587(0)88,
1587(0)103,
1587(0)117,
1587(0)129,
1587(0)135,
1587(0)149,
1587(0)164,
1587(0)177,
1587(0)192,
1587(0)202,
1587(0)213,
1587(0)228,
1587(0)244,
1587(0)258,
1587(0)270,
1587(0)281,
1587(0)294,
1587(0)303,
1587(0)314
- Protection,
1570(0)167
- Scheme,
1557(0)246,
1560(0)315,
1560(0)315,
1567(0)262,
1573(0)203,
1575(0)76,
1586(0)496,
1587(0)135,
1587(0)135,
1592(0)363,
1593(0)260,
1599(0)174
- security,
1550(0)1,
1550(0)13,
1550(0)24,
1550(0)28,
1550(0)28,
1550(0)36,
1550(0)41,
1550(0)45,
1550(0)51,
1550(0)59,
1550(0)64,
1550(0)67,
1550(0)75,
1550(0)75,
1550(0)83,
1550(0)90,
1550(0)95,
1550(0)100,
1550(0)108,
1550(0)118,
1550(0)125,
1550(0)131,
1550(0)137,
1550(0)146,
1550(0)154,
1550(0)158,
1550(0)177,
1550(0)193,
1550(0)203,
1550(0)213,
1550(0)220,
1550(0)227,
1552(0)323,
1556(0)43,
1556(0)264,
1560(0)29,
1560(0)53,
1560(0)197,
1561(0)1,
1561(0)16,
1561(0)63,
1561(0)87,
1561(0)105,
1561(0)127,
1561(0)134,
1561(0)158,
1561(0)183,
1561(0)217,
1578(0)1,
1586(0)389,
1587(0)1,
1587(0)12,
1587(0)26,
1587(0)36,
1587(0)51,
1587(0)64,
1587(0)88,
1587(0)103,
1587(0)117,
1587(0)129,
1587(0)135,
1587(0)135,
1587(0)149,
1587(0)164,
1587(0)177,
1587(0)192,
1587(0)202,
1587(0)213,
1587(0)228,
1587(0)244,
1587(0)258,
1587(0)270,
1587(0)281,
1587(0)294,
1587(0)303,
1587(0)314,
1592(0)56,
1593(0)370,
1593(0)919,
1597(0)155,
1597(0)355,
1597(0)385