Author of the publication

Combinatorial Group Testing for Corruption Localizing Hashing.

, and . COCOON, volume 6842 of Lecture Notes in Computer Science, page 579-591. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Group Testing Approach to Improved Corruption Localizing Hashing., and . IACR Cryptology ePrint Archive, (2011)Metering Schemes with Pricing., , and . DISC, volume 1914 of Lecture Notes in Computer Science, page 194-208. Springer, (2000)Dynamic Multi-threshold Metering Schemes., , , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 130-143. Springer, (2000)ϵ-Almost Selectors and Their Applications., and . FCT, volume 9210 of Lecture Notes in Computer Science, page 255-268. Springer, (2015)Efficient Group Testing Algorithms with a Constrained Number of Positive Responses.. COCOA, volume 8881 of Lecture Notes in Computer Science, page 506-521. Springer, (2014)A lightweight protocol for the generation and distribution of secure e-coupons., , and . WWW, page 542-552. ACM, (2002)Generalized Framework for Selectors with Applications in Optimal Group Testing., , and . ICALP, volume 2719 of Lecture Notes in Computer Science, page 81-96. Springer, (2003)Combinatorial Group Testing for Corruption Localizing Hashing., and . COCOON, volume 6842 of Lecture Notes in Computer Science, page 579-591. Springer, (2011)A New Kind of Selectors and Their Applications to Conflict Resolution in Wireless Multichannels Networks., and . ALGOSENSORS, volume 10050 of Lecture Notes in Computer Science, page 45-61. Springer, (2016)Improved Schemes for Visual Cryptography., , and . Des. Codes Cryptogr., 24 (3): 255-278 (2001)