Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2009_21_4_a11, author = {A. Yu. Zubov}, title = {On the choice of the defence strategy for an authentication code with two-state source}, journal = {Diskretnaya Matematika}, pages = {135--147}, publisher = {mathdoc}, volume = {21}, number = {4}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/} }
A. Yu. Zubov. On the choice of the defence strategy for an authentication code with two-state source. Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147. http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/
[1] Zubov A. Yu., Matematika kodov autentifikatsii, Gelios ARV, Moskva, 2007
[2] Zubov A. Yu., “K teoretiko-igrovomu podkhodu issledovaniya kodov autentifikatsii”, Diskretnaya matematika, 21:3 (2009), 45–72
[3] Simmons G. J., “A game theoretical model of digital message authentication”, Congressus Numerantium, 34 (1982), 413–424 | MR | Zbl
[4] Simmons G. J., “Authentication theory/Coding theory”, Lect. Notes Comput. Sci., 196, 1985, 411–432
[5] Simmons G. Dzh., “Obzor metodov autentifikatsii informatsii”, TIIER, 76:5 (1988), 105–125
[6] Simmons G. J., “A survey of information authentication”, Contemporary Cryptology: The Science of Information Integrity, ed. Simmons G. J., IEEE Press, New York, 1992, 379–419 | MR