Muutke küpsiste eelistusi

E-raamat: Coding and Cryptology: Second International Workshop, IWCC 2009

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 5557
  • Ilmumisaeg: 07-Jun-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642018770
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 5557
  • Ilmumisaeg: 07-Jun-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642018770

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum
Algebraic Immunity and Good Nonlinearity.- Separation and Witnesses.- Binary
Covering Arrays and Existentially Closed Graphs.- A Class of Three-Weight and
Four-Weight Codes.- Equal-Weight Fingerprinting Codes.- Problems on
Two-Dimensional Synchronization Patterns.- A New Client-to-Client
Password-Authenticated Key Agreement Protocol.- Elliptic Twin Prime
Conjecture.- Hunting for Curves with Many Points.- List Decoding of Binary
CodesA Brief Survey of Some Recent Results.- Recent Developments in
Low-Density Parity-Check Codes.- On the Applicability of Combinatorial
Designs to Key Predistribution for Wireless Sensor Networks.- On Weierstrass
Semigroups of Some Triples on Norm-Trace Curves.- ERINDALE: A Polynomial
Based Hashing Algorithm.- A Survey of Algebraic Unitary Codes.- New Family of
Non-Cartesian Perfect Authentication Codes.- On the Impossibility of Strong
Encryption Over .- Minimum Distance between Bent and Resilient Boolean
Functions.- Unconditionally Secure Approximate Message Authentication.-
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level
Autocorrelation Sequences.- On Cayley Graphs, Surface Codes, and the Limits
of Homological Coding for Quantum Error Correction.