Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008. The papers cover network ...
اقرأ المزيد
Accessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
اقرأ المزيد
The main part of this book is a breathtaking passeggiata through the computational domains of graded rings and modules and ...
اقرأ المزيد
Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيد
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيد
It is evidence of how well the interdisciplinary nature of the conference has truly matured that the major criterion of quality, ...
اقرأ المزيد
Provides easy access to important concepts, issues and technology trends in the field of multimedia technologies, systems, ...
اقرأ المزيد
he Encyclopedia of Multimedia provides in-depth coverage of the important concepts, issues and technology trends in the field ...
اقرأ المزيد
In ECC for Non-Volatile Memories the authors expose the basics of coding theory needed to understand the application to memories, ...
اقرأ المزيد
This text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيد
This text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيد
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...
اقرأ المزيد
This book presents an up-to-date account of research in important topics of fuzzy group theory. The book concentrates on ...
اقرأ المزيد
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...
اقرأ المزيد
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
اقرأ المزيد
Information Theory and Network Coding consists of two parts: Components of Information Theory, and Fundamentals of Network ...
اقرأ المزيد