派博傳思國際中心

標(biāo)題: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding [打印本頁]

作者: Addendum    時(shí)間: 2025-3-21 17:08
書目名稱Geometries, Codes and Cryptography影響因子(影響力)




書目名稱Geometries, Codes and Cryptography影響因子(影響力)學(xué)科排名




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Geometries, Codes and Cryptography被引頻次




書目名稱Geometries, Codes and Cryptography被引頻次學(xué)科排名




書目名稱Geometries, Codes and Cryptography年度引用




書目名稱Geometries, Codes and Cryptography年度引用學(xué)科排名




書目名稱Geometries, Codes and Cryptography讀者反饋




書目名稱Geometries, Codes and Cryptography讀者反饋學(xué)科排名





作者: 上流社會(huì)    時(shí)間: 2025-3-21 21:33
0254-1971 rcle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and 978-3-211-82205-0978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: 完整    時(shí)間: 2025-3-22 03:29

作者: infringe    時(shí)間: 2025-3-22 08:27
Topics in Algebraic Coding Theoryon rate k/n but which nevertheless is capable to correct the expected number of symbol errors. Some coding bounds show, which compromises one has to accept, when designing an optimal coding system. The implementation of the encoder and decoder is facilitated, if the used code bears a mathematical st
作者: 議程    時(shí)間: 2025-3-22 10:49

作者: 侵蝕    時(shí)間: 2025-3-22 16:45

作者: 侵蝕    時(shí)間: 2025-3-22 20:17

作者: 較早    時(shí)間: 2025-3-22 21:13

作者: 啟發(fā)    時(shí)間: 2025-3-23 04:04

作者: 物種起源    時(shí)間: 2025-3-23 08:36

作者: BRACE    時(shí)間: 2025-3-23 12:07

作者: liaison    時(shí)間: 2025-3-23 17:48

作者: 公司    時(shí)間: 2025-3-23 20:03

作者: Urea508    時(shí)間: 2025-3-24 00:46

作者: perimenopause    時(shí)間: 2025-3-24 06:17
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.
作者: Decline    時(shí)間: 2025-3-24 06:46

作者: Cupidity    時(shí)間: 2025-3-24 14:07
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.
作者: Daily-Value    時(shí)間: 2025-3-24 18:51
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 征服    時(shí)間: 2025-3-24 21:47

作者: 懶洋洋    時(shí)間: 2025-3-25 01:11

作者: 和藹    時(shí)間: 2025-3-25 04:27

作者: 流出    時(shí)間: 2025-3-25 09:59
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 混合物    時(shí)間: 2025-3-25 13:17
Authentication / Secrecy Codesconditional secrecy due to Shannon [17] Simmons developed a theory of unconditional authentication [19]. In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.
作者: Generator    時(shí)間: 2025-3-25 16:36

作者: 反叛者    時(shí)間: 2025-3-25 20:32

作者: 反復(fù)無常    時(shí)間: 2025-3-26 00:26
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: Serenity    時(shí)間: 2025-3-26 06:07

作者: INCH    時(shí)間: 2025-3-26 12:19

作者: 搖曳    時(shí)間: 2025-3-26 13:57

作者: Rejuvenate    時(shí)間: 2025-3-26 18:15
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias [31], and useful introductory references include [15,36,38,75,81]. The following books have significant sections devo
作者: clarify    時(shí)間: 2025-3-26 21:35

作者: exostosis    時(shí)間: 2025-3-27 04:08

作者: 兇猛    時(shí)間: 2025-3-27 08:07

作者: gerontocracy    時(shí)間: 2025-3-27 11:03

作者: DEMN    時(shí)間: 2025-3-27 15:39

作者: Infant    時(shí)間: 2025-3-27 21:31

作者: Accede    時(shí)間: 2025-3-28 00:47
Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.
作者: TEM    時(shí)間: 2025-3-28 05:35

作者: 方舟    時(shí)間: 2025-3-28 09:44

作者: 可憎    時(shí)間: 2025-3-28 10:25

作者: GOUGE    時(shí)間: 2025-3-28 18:21





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平邑县| 岑溪市| 白水县| 双江| 泰州市| 周至县| 梅河口市| 定安县| 石景山区| 栾川县| 丹江口市| 山丹县| 临夏县| 平湖市| 慈溪市| 涞水县| 临汾市| 绥化市| 郑州市| 当雄县| 西乡县| 和静县| 百色市| 绍兴市| 台东县| 澄迈县| 洛川县| 交口县| 聂荣县| 肇源县| 子长县| 凤城市| 什邡市| 镶黄旗| 乐昌市| 巴楚县| 河北区| 鹤岗市| 兰溪市| 怀宁县| 松溪县|