派博傳思國際中心

標(biāo)題: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding [打印本頁]

作者: Addendum    時(shí)間: 2025-3-21 17:08
書目名稱Geometries, Codes and Cryptography影響因子(影響力)




書目名稱Geometries, Codes and Cryptography影響因子(影響力)學(xué)科排名




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Geometries, Codes and Cryptography被引頻次




書目名稱Geometries, Codes and Cryptography被引頻次學(xué)科排名




書目名稱Geometries, Codes and Cryptography年度引用




書目名稱Geometries, Codes and Cryptography年度引用學(xué)科排名




書目名稱Geometries, Codes and Cryptography讀者反饋




書目名稱Geometries, Codes and Cryptography讀者反饋學(xué)科排名





作者: 上流社會(huì)    時(shí)間: 2025-3-21 21:33
0254-1971 rcle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and 978-3-211-82205-0978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: 完整    時(shí)間: 2025-3-22 03:29

作者: infringe    時(shí)間: 2025-3-22 08:27
Topics in Algebraic Coding Theoryon rate k/n but which nevertheless is capable to correct the expected number of symbol errors. Some coding bounds show, which compromises one has to accept, when designing an optimal coding system. The implementation of the encoder and decoder is facilitated, if the used code bears a mathematical st
作者: 議程    時(shí)間: 2025-3-22 10:49

作者: 侵蝕    時(shí)間: 2025-3-22 16:45

作者: 侵蝕    時(shí)間: 2025-3-22 20:17

作者: 較早    時(shí)間: 2025-3-22 21:13

作者: 啟發(fā)    時(shí)間: 2025-3-23 04:04

作者: 物種起源    時(shí)間: 2025-3-23 08:36

作者: BRACE    時(shí)間: 2025-3-23 12:07

作者: liaison    時(shí)間: 2025-3-23 17:48

作者: 公司    時(shí)間: 2025-3-23 20:03

作者: Urea508    時(shí)間: 2025-3-24 00:46

作者: perimenopause    時(shí)間: 2025-3-24 06:17
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.
作者: Decline    時(shí)間: 2025-3-24 06:46

作者: Cupidity    時(shí)間: 2025-3-24 14:07
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.
作者: Daily-Value    時(shí)間: 2025-3-24 18:51
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 征服    時(shí)間: 2025-3-24 21:47

作者: 懶洋洋    時(shí)間: 2025-3-25 01:11

作者: 和藹    時(shí)間: 2025-3-25 04:27

作者: 流出    時(shí)間: 2025-3-25 09:59
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 混合物    時(shí)間: 2025-3-25 13:17
Authentication / Secrecy Codesconditional secrecy due to Shannon [17] Simmons developed a theory of unconditional authentication [19]. In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.
作者: Generator    時(shí)間: 2025-3-25 16:36

作者: 反叛者    時(shí)間: 2025-3-25 20:32

作者: 反復(fù)無常    時(shí)間: 2025-3-26 00:26
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: Serenity    時(shí)間: 2025-3-26 06:07

作者: INCH    時(shí)間: 2025-3-26 12:19

作者: 搖曳    時(shí)間: 2025-3-26 13:57

作者: Rejuvenate    時(shí)間: 2025-3-26 18:15
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias [31], and useful introductory references include [15,36,38,75,81]. The following books have significant sections devo
作者: clarify    時(shí)間: 2025-3-26 21:35

作者: exostosis    時(shí)間: 2025-3-27 04:08

作者: 兇猛    時(shí)間: 2025-3-27 08:07

作者: gerontocracy    時(shí)間: 2025-3-27 11:03

作者: DEMN    時(shí)間: 2025-3-27 15:39

作者: Infant    時(shí)間: 2025-3-27 21:31

作者: Accede    時(shí)間: 2025-3-28 00:47
Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.
作者: TEM    時(shí)間: 2025-3-28 05:35

作者: 方舟    時(shí)間: 2025-3-28 09:44

作者: 可憎    時(shí)間: 2025-3-28 10:25

作者: GOUGE    時(shí)間: 2025-3-28 18:21





歡迎光臨 派博傳思國際中心 (http://www.yitongpaimai.cn/) Powered by Discuz! X3.5
汶川县| 金沙县| 博白县| 喀什市| 东城区| 绥化市| 敦化市| 霍城县| 岑溪市| 当涂县| 左权县| 遂溪县| 贡觉县| 当雄县| 山西省| 花垣县| 于田县| 南通市| 荆州市| 共和县| 修水县| 独山县| 香河县| 浦江县| 万盛区| 永胜县| 巧家县| 玉树县| 阿勒泰市| 和平县| 沾益县| 和林格尔县| 义马市| 曲阜市| 濮阳市| 安宁市| 会同县| 清流县| 佛教| 磴口县| 合肥市|