Cargando…

Coding and cryptography : synergy for a robust communication /

This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The int...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Živić, Nataša
Formato: Electrónico eBook
Idioma:Inglés
Publicado: München : Oldenbourg Wissenschaftsverlag, [2013]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn872677913
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 140131t20132013gw a ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d N$T  |d YDXCP  |d OCLCF  |d IDEBK  |d EBLCP  |d DEBSZ  |d BTCTA  |d OCLCQ  |d AGLDB  |d MOR  |d CCO  |d PIFAG  |d OCLCA  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d STF  |d VTS  |d NRAMU  |d ICG  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d U9X  |d AJS  |d OCLCQ  |d SNK  |d OCLCO  |d OCLCQ  |d DEGRU  |d OCLCO  |d OCLCL 
019 |a 865330083  |a 961590768  |a 1084349193 
020 |a 9783486781267  |q (electronic bk.) 
020 |a 348678126X  |q (electronic bk.) 
020 |a 348675212X 
020 |a 9783486752120 
020 |z 9783486752120 
024 7 |a 10.1524/9783486781267  |2 doi 
029 1 |a CHNEW  |b 000985586 
029 1 |a CHVBK  |b 509385036 
029 1 |a DEBBG  |b BV042992004 
029 1 |a DEBBG  |b BV043031344 
029 1 |a DEBBG  |b BV043958117 
029 1 |a DEBBG  |b BV044063119 
029 1 |a DEBSZ  |b 397033060 
029 1 |a DEBSZ  |b 39956599X 
029 1 |a DEBSZ  |b 42996109X 
035 |a (OCoLC)872677913  |z (OCoLC)865330083  |z (OCoLC)961590768  |z (OCoLC)1084349193 
050 4 |a QA268  |b .Z58 2013eb 
072 7 |a TEC  |x 009070  |2 bisacsh 
082 0 4 |a 621.3 
084 |a ZN 6045  |2 rvk 
049 |a UAMI 
100 1 |a Živić, Nataša. 
245 1 0 |a Coding and cryptography :  |b synergy for a robust communication /  |c Dr.-Ing. habil. Nataša Živić, Universität Siegen. 
264 1 |a München :  |b Oldenbourg Wissenschaftsverlag,  |c [2013] 
264 4 |c ©2013 
300 |a 1 online resource (134 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed January 31, 2014). 
505 0 |a Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion. 
505 8 |a 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes. 
505 8 |a 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions. 
505 8 |a 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations. 
520 |a This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Coding theory. 
650 0 |a Cryptography. 
650 6 |a Cryptographie. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Mechanical.  |2 bisacsh 
650 7 |a Coding theory  |2 fast 
650 7 |a Cryptography  |2 fast 
758 |i has work:  |a Coding and cryptography (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFBWDXQctF94CKD8M7VFqP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Živic, Nataša.  |t Coding and Cryptography : Synergy for a Robust Communication.  |d München : De Gruyter, ©2013  |z 9783486752120 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1377173  |z Texto completo 
936 |a BATCHLOAD 
938 |a De Gruyter  |b DEGR  |n 9783486781267 
938 |a Baker and Taylor  |b BTCP  |n BK0018088261 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1377173 
938 |a ebrary  |b EBRY  |n ebr10829516 
938 |a EBSCOhost  |b EBSC  |n 674485 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26510620 
938 |a YBP Library Services  |b YANK  |n 10917835 
994 |a 92  |b IZTAP