2007 | ||
---|---|---|
6 | EE | Edward C. van der Meulen, Peter Vanroose: The Capacity of a Relay Channel, Both With and Without Delay. IEEE Transactions on Information Theory 53(10): 3774-3776 (2007) |
1997 | ||
5 | M. Ruszinko, Peter Vanroose: How an Erdöos-Rényi-type search approach gives an explicit code construction of rate 1 for random access with multiplicity feedback. IEEE Transactions on Information Theory 43(1): 368-372 (1997) | |
1994 | ||
4 | Zhe-xian Wan, Ben J. M. Smeets, Peter Vanroose: On the construction of cartesian authentication codes over symplectic spaces. IEEE Transactions on Information Theory 40(3): 920- (1994) | |
1992 | ||
3 | Peter Vanroose, Edward C. van der Meulen: Uniquely decodable codes for deterministic relay channels. IEEE Transactions on Information Theory 38(4): 1203-1212 (1992) | |
1990 | ||
2 | EE | Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan: On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. EUROCRYPT 1990: 306-312 |
1988 | ||
1 | Peter Vanroose: Code construction for the noiseless binary switching multiple-access channel. IEEE Transactions on Information Theory 34(5): 1100- (1988) |
1 | Edward C. van der Meulen | [3] [6] |
2 | M. Ruszinko | [5] |
3 | Ben J. M. Smeets (Bernhard Smeets) | [2] [4] |
4 | Zhe-xian Wan | [2] [4] |