|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn872677913 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140131t20132013gw a ob 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d N$T
|d YDXCP
|d OCLCF
|d IDEBK
|d EBLCP
|d DEBSZ
|d BTCTA
|d OCLCQ
|d AGLDB
|d MOR
|d CCO
|d PIFAG
|d OCLCA
|d ZCU
|d MERUC
|d OCLCQ
|d U3W
|d STF
|d VTS
|d NRAMU
|d ICG
|d OCLCQ
|d INT
|d VT2
|d OCLCQ
|d WYU
|d TKN
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d U9X
|d AJS
|d OCLCQ
|d SNK
|d OCLCO
|d OCLCQ
|d DEGRU
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 865330083
|a 961590768
|a 1084349193
|
020 |
|
|
|a 9783486781267
|q (electronic bk.)
|
020 |
|
|
|a 348678126X
|q (electronic bk.)
|
020 |
|
|
|a 348675212X
|
020 |
|
|
|a 9783486752120
|
020 |
|
|
|z 9783486752120
|
024 |
7 |
|
|a 10.1524/9783486781267
|2 doi
|
029 |
1 |
|
|a CHNEW
|b 000985586
|
029 |
1 |
|
|a CHVBK
|b 509385036
|
029 |
1 |
|
|a DEBBG
|b BV042992004
|
029 |
1 |
|
|a DEBBG
|b BV043031344
|
029 |
1 |
|
|a DEBBG
|b BV043958117
|
029 |
1 |
|
|a DEBBG
|b BV044063119
|
029 |
1 |
|
|a DEBSZ
|b 397033060
|
029 |
1 |
|
|a DEBSZ
|b 39956599X
|
029 |
1 |
|
|a DEBSZ
|b 42996109X
|
035 |
|
|
|a (OCoLC)872677913
|z (OCoLC)865330083
|z (OCoLC)961590768
|z (OCoLC)1084349193
|
050 |
|
4 |
|a QA268
|b .Z58 2013eb
|
072 |
|
7 |
|a TEC
|x 009070
|2 bisacsh
|
082 |
0 |
4 |
|a 621.3
|
084 |
|
|
|a ZN 6045
|2 rvk
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Živić, Nataša.
|
245 |
1 |
0 |
|a Coding and cryptography :
|b synergy for a robust communication /
|c Dr.-Ing. habil. Nataša Živić, Universität Siegen.
|
264 |
|
1 |
|a München :
|b Oldenbourg Wissenschaftsverlag,
|c [2013]
|
264 |
|
4 |
|c ©2013
|
300 |
|
|
|a 1 online resource (134 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed January 31, 2014).
|
505 |
0 |
|
|a Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion.
|
505 |
8 |
|
|a 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes.
|
505 |
8 |
|
|a 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions.
|
505 |
8 |
|
|a 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations.
|
520 |
|
|
|a This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Mechanical.
|2 bisacsh
|
650 |
|
7 |
|a Coding theory
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
758 |
|
|
|i has work:
|a Coding and cryptography (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFBWDXQctF94CKD8M7VFqP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Živic, Nataša.
|t Coding and Cryptography : Synergy for a Robust Communication.
|d München : De Gruyter, ©2013
|z 9783486752120
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1377173
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9783486781267
|
938 |
|
|
|a Baker and Taylor
|b BTCP
|n BK0018088261
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1377173
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10829516
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 674485
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26510620
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10917835
|
994 |
|
|
|a 92
|b IZTAP
|