派博傳思國際中心

標(biāo)題: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding [打印本頁]

作者: Addendum    時(shí)間: 2025-3-21 17:08
書目名稱Geometries, Codes and Cryptography影響因子(影響力)




書目名稱Geometries, Codes and Cryptography影響因子(影響力)學(xué)科排名




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度




書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Geometries, Codes and Cryptography被引頻次




書目名稱Geometries, Codes and Cryptography被引頻次學(xué)科排名




書目名稱Geometries, Codes and Cryptography年度引用




書目名稱Geometries, Codes and Cryptography年度引用學(xué)科排名




書目名稱Geometries, Codes and Cryptography讀者反饋




書目名稱Geometries, Codes and Cryptography讀者反饋學(xué)科排名





作者: 上流社會(huì)    時(shí)間: 2025-3-21 21:33
0254-1971 rcle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and 978-3-211-82205-0978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: 完整    時(shí)間: 2025-3-22 03:29

作者: infringe    時(shí)間: 2025-3-22 08:27
Topics in Algebraic Coding Theoryon rate k/n but which nevertheless is capable to correct the expected number of symbol errors. Some coding bounds show, which compromises one has to accept, when designing an optimal coding system. The implementation of the encoder and decoder is facilitated, if the used code bears a mathematical st
作者: 議程    時(shí)間: 2025-3-22 10:49

作者: 侵蝕    時(shí)間: 2025-3-22 16:45

作者: 侵蝕    時(shí)間: 2025-3-22 20:17

作者: 較早    時(shí)間: 2025-3-22 21:13

作者: 啟發(fā)    時(shí)間: 2025-3-23 04:04

作者: 物種起源    時(shí)間: 2025-3-23 08:36

作者: BRACE    時(shí)間: 2025-3-23 12:07

作者: liaison    時(shí)間: 2025-3-23 17:48

作者: 公司    時(shí)間: 2025-3-23 20:03

作者: Urea508    時(shí)間: 2025-3-24 00:46

作者: perimenopause    時(shí)間: 2025-3-24 06:17
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.
作者: Decline    時(shí)間: 2025-3-24 06:46

作者: Cupidity    時(shí)間: 2025-3-24 14:07
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.
作者: Daily-Value    時(shí)間: 2025-3-24 18:51
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 征服    時(shí)間: 2025-3-24 21:47

作者: 懶洋洋    時(shí)間: 2025-3-25 01:11

作者: 和藹    時(shí)間: 2025-3-25 04:27

作者: 流出    時(shí)間: 2025-3-25 09:59
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
作者: 混合物    時(shí)間: 2025-3-25 13:17
Authentication / Secrecy Codesconditional secrecy due to Shannon [17] Simmons developed a theory of unconditional authentication [19]. In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.
作者: Generator    時(shí)間: 2025-3-25 16:36

作者: 反叛者    時(shí)間: 2025-3-25 20:32

作者: 反復(fù)無常    時(shí)間: 2025-3-26 00:26
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
作者: Serenity    時(shí)間: 2025-3-26 06:07

作者: INCH    時(shí)間: 2025-3-26 12:19

作者: 搖曳    時(shí)間: 2025-3-26 13:57

作者: Rejuvenate    時(shí)間: 2025-3-26 18:15
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias [31], and useful introductory references include [15,36,38,75,81]. The following books have significant sections devo
作者: clarify    時(shí)間: 2025-3-26 21:35

作者: exostosis    時(shí)間: 2025-3-27 04:08

作者: 兇猛    時(shí)間: 2025-3-27 08:07

作者: gerontocracy    時(shí)間: 2025-3-27 11:03

作者: DEMN    時(shí)間: 2025-3-27 15:39

作者: Infant    時(shí)間: 2025-3-27 21:31

作者: Accede    時(shí)間: 2025-3-28 00:47
Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.
作者: TEM    時(shí)間: 2025-3-28 05:35

作者: 方舟    時(shí)間: 2025-3-28 09:44

作者: 可憎    時(shí)間: 2025-3-28 10:25

作者: GOUGE    時(shí)間: 2025-3-28 18:21





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
班玛县| 襄垣县| 五大连池市| 师宗县| 从江县| 广水市| 黔西| 府谷县| 青神县| 六安市| 杭州市| 新和县| 周口市| 榆社县| 内江市| 沂南县| 扎鲁特旗| 德钦县| 沛县| 观塘区| 浦城县| 谢通门县| 新兴县| 萝北县| 钦州市| 房产| 扎兰屯市| 临武县| 时尚| 阿鲁科尔沁旗| 永州市| 万源市| 彰化市| 高平市| 全南县| 荆州市| 马关县| 伊宁市| 和静县| 门源| 嘉义县|