派博傳思國際中心

標(biāo)題: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding [打印本頁]

作者: Addendum    時(shí)間: 2025-3-21 17:08
書目名稱Geometries, Codes and Cryptography影響因子(影響力)




書目名稱Geometries, Codes and Cryptography影響因子(影響力)學(xué)科排名




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Geometries, Codes and Cryptography被引頻次




書目名稱Geometries, Codes and Cryptography被引頻次學(xué)科排名




書目名稱Geometries, Codes and Cryptography年度引用




書目名稱Geometries, Codes and Cryptography年度引用學(xué)科排名




書目名稱Geometries, Codes and Cryptography讀者反饋




書目名稱Geometries, Codes and Cryptography讀者反饋學(xué)科排名





作者: 上流社會(huì)    時(shí)間: 2025-3-21 21:33
0254-1971 rcle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and 978-3-211-82205-0978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: 完整    時(shí)間: 2025-3-22 03:29

作者: infringe    時(shí)間: 2025-3-22 08:27
Topics in Algebraic Coding Theoryon rate k/n but which nevertheless is capable to correct the expected number of symbol errors. Some coding bounds show, which compromises one has to accept, when designing an optimal coding system. The implementation of the encoder and decoder is facilitated, if the used code bears a mathematical st
作者: 議程    時(shí)間: 2025-3-22 10:49

作者: 侵蝕    時(shí)間: 2025-3-22 16:45

作者: 侵蝕    時(shí)間: 2025-3-22 20:17

作者: 較早    時(shí)間: 2025-3-22 21:13

作者: 啟發(fā)    時(shí)間: 2025-3-23 04:04

作者: 物種起源    時(shí)間: 2025-3-23 08:36

作者: BRACE    時(shí)間: 2025-3-23 12:07

作者: liaison    時(shí)間: 2025-3-23 17:48

作者: 公司    時(shí)間: 2025-3-23 20:03

作者: Urea508    時(shí)間: 2025-3-24 00:46

作者: perimenopause    時(shí)間: 2025-3-24 06:17
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.
作者: Decline    時(shí)間: 2025-3-24 06:46

作者: Cupidity    時(shí)間: 2025-3-24 14:07
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.
作者: Daily-Value    時(shí)間: 2025-3-24 18:51
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 征服    時(shí)間: 2025-3-24 21:47

作者: 懶洋洋    時(shí)間: 2025-3-25 01:11

作者: 和藹    時(shí)間: 2025-3-25 04:27

作者: 流出    時(shí)間: 2025-3-25 09:59
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 混合物    時(shí)間: 2025-3-25 13:17
Authentication / Secrecy Codesconditional secrecy due to Shannon [17] Simmons developed a theory of unconditional authentication [19]. In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.
作者: Generator    時(shí)間: 2025-3-25 16:36

作者: 反叛者    時(shí)間: 2025-3-25 20:32

作者: 反復(fù)無常    時(shí)間: 2025-3-26 00:26
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: Serenity    時(shí)間: 2025-3-26 06:07

作者: INCH    時(shí)間: 2025-3-26 12:19

作者: 搖曳    時(shí)間: 2025-3-26 13:57

作者: Rejuvenate    時(shí)間: 2025-3-26 18:15
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias [31], and useful introductory references include [15,36,38,75,81]. The following books have significant sections devo
作者: clarify    時(shí)間: 2025-3-26 21:35

作者: exostosis    時(shí)間: 2025-3-27 04:08

作者: 兇猛    時(shí)間: 2025-3-27 08:07

作者: gerontocracy    時(shí)間: 2025-3-27 11:03

作者: DEMN    時(shí)間: 2025-3-27 15:39

作者: Infant    時(shí)間: 2025-3-27 21:31

作者: Accede    時(shí)間: 2025-3-28 00:47
Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.
作者: TEM    時(shí)間: 2025-3-28 05:35

作者: 方舟    時(shí)間: 2025-3-28 09:44

作者: 可憎    時(shí)間: 2025-3-28 10:25

作者: GOUGE    時(shí)間: 2025-3-28 18:21





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
舟曲县| 调兵山市| 十堰市| 苏州市| 磐安县| 万宁市| 邵武市| 永春县| 康马县| 登封市| 鹿泉市| 石城县| 西藏| 永安市| 澄江县| 西乌珠穆沁旗| 安仁县| 永德县| 凤城市| 海兴县| 镇平县| 泸州市| 道孚县| 海南省| 从江县| 尼勒克县| 潜江市| 永清县| 绥宁县| 寻甸| 多伦县| 永修县| 福海县| 荥经县| 景宁| 麦盖提县| 文水县| 华池县| 壤塘县| 南汇区| 略阳县|