- 5 Risultati
prezzo più basso: € 48,37, prezzo più alto: € 59,11, prezzo medio: € 53,91
1
Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - Bahram Honary
Ordina
da ZVAB.com
€ 52,96
Spedizione: € 12,991
OrdinaLink sponsorizzato
Bahram Honary:

Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - edizione con copertina flessibile

2001, ISBN: 3540430261

[EAN: 9783540430261], Neubuch, [SC: 12.99], [PU: Springer Berlin Heidelberg], CODE - BARCODE; CODIERUNG; KODE; DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / KRYPTOGRAFIE; VERSCHLÜSSELUNG;… Altro …

NEW BOOK. Costi di spedizione: EUR 12.99 AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
2
Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - Bahram Honary
Ordina
da ZVAB.com
€ 59,11
Spedizione: € 0,001
OrdinaLink sponsorizzato

Bahram Honary:

Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - edizione con copertina flessibile

2001, ISBN: 3540430261

[EAN: 9783540430261], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], CODE - BARCODE; CODIERUNG; KODE; DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / KRYPTOGRAFIE; VERSCHLÜSSELUNG; D… Altro …

NEW BOOK. Costi di spedizione:Versandkostenfrei. (EUR 0.00) AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
3
Cryptography and Coding
Ordina
da Springer.com
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Cryptography and Coding - nuovo libro

ISBN: 9783540430261

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical … Altro …

Nr. 978-3-540-43026-1. Costi di spedizione:Worldwide free shipping, , DE. (EUR 0.00)
4
Cryptography and Coding 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - Honary, Bahram (Herausgeber)
Ordina
da Achtung-Buecher.de
€ 55,60
Spedizione: € 0,001
OrdinaLink sponsorizzato
Honary, Bahram (Herausgeber):
Cryptography and Coding 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings - nuovo libro

2001, ISBN: 3540430261

2001 Kartoniert / Broschiert Code - Barcode, Codierung, Kode, Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Informationstheorie, Kodierun… Altro …

Costi di spedizione:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
5
Cryptography and Coding - Honary, Bahram
Ordina
da AbeBooks.de
€ 48,37
Spedizione: € 13,001
OrdinaLink sponsorizzato
Honary, Bahram:
Cryptography and Coding - edizione con copertina flessibile

2001, ISBN: 3540430261

[EAN: 9783540430261], Neubuch, [PU: Springer Berlin Heidelberg], CODE - BARCODE CODIERUNG KODE DATENSICHERHEIT DATENSICHERUNG SICHERHEIT KRYPTOGRAFIE VERSCHLüSSELUNG DES ALGORITHMS COMMU… Altro …

NEW BOOK. Costi di spedizione: EUR 13.00 moluna, Greven, Germany [73551232] [Rating: 4 (von 5)]

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Cryptography and Coding

This book constitutes the refereed proceedings of the 8th International IMA Conference on Cryptography and Coding held in Cirencester, UK in December 2001. The 33 revised full papers presented together with four invited papers were carefully reviewed and selected from numerous submissions. Among the topics covered are mathematical bounds, statistical decoding schemes for error-correcting codes, multifunctional and multiple access communication systems, low density parity check codes, iterative coding, authentication, key recovery attacks, stream cipher design, analysis of ECIES algorithms, and lattice bases attacks on IP based protocols.

Informazioni dettagliate del libro - Cryptography and Coding


EAN (ISBN-13): 9783540430261
ISBN (ISBN-10): 3540430261
Copertina flessibile
Anno di pubblicazione: 2001
Editore: Springer Berlin
432 Pagine
Peso: 0,649 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2007-07-29T22:03:01+02:00 (Rome)
Pagina di dettaglio ultima modifica in 2023-12-13T18:11:31+01:00 (Rome)
ISBN/EAN: 9783540430261

ISBN - Stili di scrittura alternativi:
3-540-43026-1, 978-3-540-43026-1
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : bahram
Titolo del libro: cryptography coding, ima, proceedings conference, 2001


Dati dell'editore

Autore: Bahram Honary
Titolo: Lecture Notes in Computer Science; Cryptography and Coding - 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings
Editore: Springer; Springer Berlin
419 Pagine
Anno di pubblicazione: 2001-12-10
Berlin; Heidelberg; DE
Stampato / Fatto in
Peso: 1,330 kg
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
IX, 419 p.

BC; Cryptology; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; DES; algorithms; coding; communication; crypto-system-design; cryptography; decoding algorithms; digital signatures; error-correcting code; error-correcting codes; finite field computations; information security; random numbers; secure communications; statistical decoding; Theory of Computation; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Communication Networks; Management of Computing and Information Systems; Cryptology; Theory of Computation; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Communication Networks; IT Operations; Kryptografie, Verschlüsselungstechnologie; Theoretische Informatik; Informationstheorie; Mathematik für Informatiker; Diskrete Mathematik; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; EA

A Statistical Decoding Algorithm for General Linear Block Codes.- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory.- The Complete Weight Enumerator for Codes over M nxs(F q).- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes.- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks.- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.- The Exact Security of ECIES in the Generic Group Model.- A New Ultrafast Stream Cipher Design: COS Ciphers.- On Rabin-Type Signatures.- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps.- Almost-Certainly Runlength-Limiting Codes.- Weight vs. Magnetization Enumerator for Gallager Codes.- Graph Configurations and Decoding Performance.- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing.- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems.- Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces.- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.- The Wide Trail Design Strategy.- Undetachable Threshold Signatures.- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.- Unconditionally Secure Key Agreement Protocol.- An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices.- Investigation of Linear Codes Possessing Some Extra Properties.- Statistical Physics of Low Density Parity Check Error Correcting Codes.- Generating Large Instances of the Gong-Harn Cryptosystem.- Lattice Attacks on RSA-Encrypted IP and TCP.- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement.- Attacking the Affine Parts of SFLASH.- An Identity Based Encryption Scheme Based on Quadratic Residues.- Another Way of Doing RSA Cryptography in Hardware.- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA.- A New Undeniable Signature Scheme Using Smart Cards.- Non-binary Block Inseparable Errors Control Codes.- Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding.

< Per archiviare...