Examples: Prince; Princeton University; Ken Follett; Follett,Ken
1shortlisttitle datasearch history  
results search [or] (ISNI Number (ISN:)) 0000000110840474 | 1 hits
Person
ISNI: 
0000 0001 1084 0474
Name: 
Stinson, D.
Stinson, D. R.
Stinson, D. Robert
Stinson, Doug
Stinson, Douglas
Stinson, Douglas R.
Stinson, Douglas Robert
Dates: 
1956-
Creation class: 
article
cre
Language material
Text
txt
Creation role: 
author
creator
editor
redactor
Related names: 
CRYPTO 13, 1993, Santa Barbara, Calif
Dinitz, Jeffrey H.
Kreher, Donald L.
Muir, James A.
Tavares, Stafford (1940-)
Tran, Van-Trung
University of Waterloo
University of Waterloo. Department of Combinatorics and Optimization
University of Waterloo. Faculty of Mathematics
Vaudenay, Serge
Wei, R.
Wydawnictwa Naukowo-Techniczne
桜井, 幸一
Titles: 
Advances in cryptology - CRYPTO '93 : 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 : proceedings
Advances in cryptology CRYTO'93 13th Annual international cryptology conference, Santa Barbara, California, USA, August 22-26, 1993, proceedings
Almost k-wise independent sample spaces and their cryptologic applications
Alternative digit sets for nonadjacent representations
Angō riron no kiso
application of ramp schemes to broadcast encryption, An
Attack on a concast signature scheme
Combinatorial algorithms : generation, enumeration, and search
combinatorial approach to key predistribution for distributed sensor networks, A
Combinatorial designs : constructions and analysis
Combinatorial properties of frameproof and traceability codes
Common intersection designs
Contemporary design theory a collection of surveys
Cryptoanalysis of the Sakazaki-Okamoto-Mambo ID-based key distribution system over elliptic curves (extended abstract)
Cryptographie théorie et pratique
Cryptography : theory and practice
Decomposition Constructions for Secret-Sharing Schemes
Edge-coloured designs with block size four
Efficient metering schemes with pricing
Exact covering configurations and Steiner systems
existence of Howell designs of even side, The
existence of Howell designs of odd side, The
Frameproof and IPP codes
Generalized mix functions and orthogonal equitable rectangles
introduction to the design and anaylsis of algorithms, 1987, An
Key preassigned traceability schemes for broadcast encryption (extended abstract)
Kirkman triple systems with maximum subsystems
Kryptografia : w teorii i w praktyce
Metering schemes for general access structures
Mi ma xue yu li yu shi jian
Mi ma xue yuan li yu shi jian
Minimality and other properties of the width-[omega] nonadjacent form
New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups
new family of Gold-like sequences, A
New minimal weight representations for left-to-right window methods
non-existence of a (2,4)-frame, The
On the low hamming weight discrete logarithm problem for nonadjacent representations
On the number of blocks in a perfect covering of v points
Pairwise balanced designs with block sizes 6t@1
Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates
public key cryptosystem from logarithmic signatures of finite permutation groups (preliminary report), A
SAC 2010
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
Selected areas in cryptography 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers
Selected areas in cryptography 7th annual international workshop ; proceedings
Selected areas in cryptograpy : 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000 : proceedings
Slope packings and coverings, and generic algorithms for the discrete logarithm problem
Some classes of frames, and the spectra of skew room squares and Howell designs
Some new results on key distribution patterns and broadcast encryption
Some observations on the theory of cryptographic hash functions
Some results concerning frames, room squares, and subsquares
Some Results on Nonlinear Zigzag Functions
Spanning sets and scattering sets in Steiner triple systems
Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels
Unconditionally secure proactive secret sharing scheme with combinatorial structures
Universal hash families and the leftover hash lemma, and applications to cryptography and computing
暗号理論の基礎
Contributed to or performed: 
DESIGNS CODES AND CRYPTOGRAPHY
IEEE TRANSACTIONS ON INFORMATION THEORY IT
INFORMATION PROCESSING LETTERS
JOURNAL OF COMBINATORIAL MATHEMATICS AND COMBINATORIAL COMPUTING
Notes: 
Thesis (Ph. D.)--University of Waterloo, 1981
Sources: 
VIAF BNF DNB LAC LC NDL NKC NLP NSK NTA NUKAT SUDOC WKP
TEL
ZETO