Cryptography: theory and practice DR Stinson Chapman and Hall/CRC, 2005 | 7535 | 2005 |
Visual cryptography for general access structures G Ateniese, C Blundo, A De Santis, DR Stinson Information and computation 129 (2), 86-106, 1996 | 939 | 1996 |
Combinatorial designs: constructions and analysis DR Stinson ACM SIGACT News 39 (4), 17-21, 2008 | 916 | 2008 |
Combinatorial algorithms: generation, enumeration, and search DL Kreher, DR Stinson ACM SIGACT News 30 (1), 33-35, 1999 | 905 | 1999 |
A provably secure true random number generator with built-in tolerance to active attacks B Sunar, WJ Martin, DR Stinson IEEE Transactions on computers 56 (1), 109-119, 2006 | 792 | 2006 |
Extended capabilities for visual cryptography G Ateniese, C Blundo, A De Santis, DR Stinson Theoretical Computer Science 250 (1-2), 143-161, 2001 | 660 | 2001 |
An explication of secret sharing schemes DR Stinson Designs, Codes and Cryptography 2 (4), 357-390, 1992 | 534 | 1992 |
Combinatorial properties of frameproof and traceability codes JN Staddon, DR Stinson, R Wei IEEE transactions on information theory 47 (3), 1042-1049, 2001 | 435 | 2001 |
On the contrast in visual cryptography schemes C Blundo, A De Santis, DR Stinson Journal of Cryptology 12 (4), 261-289, 1999 | 381 | 1999 |
Universal hashing and authentication codes DR Stinson Designs, Codes and Cryptography 4 (3), 369-380, 1994 | 361 | 1994 |
Combinatorial properties and constructions of traceability schemes and frameproof codes DR Stinson, R Wei SIAM Journal on Discrete Mathematics 11 (1), 41-53, 1998 | 359 | 1998 |
Deterministic key predistribution schemes for distributed sensor networks J Lee, DR Stinson International Workshop on Selected Areas in Cryptography, 294-307, 2004 | 288 | 2004 |
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures DR Stinson, T Van Trung, R Wei Journal of Statistical Planning and Inference 86 (2), 595-617, 2000 | 287 | 2000 |
Contrast optimal threshold visual cryptography schemes C Blundo, P D'Arco, A De Santis, DR Stinson SIAM Journal on Discrete Mathematics 16 (2), 224-261, 2003 | 261 | 2003 |
Decomposition constructions for secret-sharing schemes DR Stinson IEEE Transactions on Information Theory 40 (1), 118-125, 1994 | 255 | 1994 |
A combinatorial approach to key predistribution for distributed sensor networks J Lee, DR Stinson IEEE Wireless Communications and Networking Conference, 2005 2, 1200-1205, 2005 | 249 | 2005 |
On some methods for unconditionally secure key distribution and broadcast encryption DR Stinson Selected areas in cryptography, 3-31, 1997 | 248 | 1997 |
Contemporary design theory: A collection of Surveys JH Dinitz, DR Stinson John Wiley & Sons, 1992 | 234 | 1992 |
Some improved bounds on the information rate of perfect secret sharing schemes EF Brickell, DR Stinson Journal of cryptology 5 (3), 153-166, 1992 | 229 | 1992 |
Universal hashing and authentication codes DR Stinson Annual International Cryptology Conference, 74-85, 1991 | 218 | 1991 |