Cargando…

Coding and cryptology : proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 /

Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Workshop on Coding and Cryptology Wuyi Mountain, China
Otros Autores: Li, Yongqing
Formato: Electrónico Congresos, conferencias eBook
Idioma:Inglés
Publicado: Singapore ; London : World Scientific, 2008.
Colección:Series on coding theory and cryptology.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn835162259
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130403s2008 si ob 101 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCO  |d LGG  |d UMC  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d OCLCA  |d MERUC  |d ZCU  |d OCLCA  |d OCLCQ  |d VTS  |d ICG  |d OCLCQ  |d STF  |d DKC  |d AU@  |d OCLCQ  |d M8D  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 820944566  |a 1058518799  |a 1086441248 
020 |a 9789812832245  |q (electronic bk.) 
020 |a 9812832246  |q (electronic bk.) 
020 |z 9789812832238 
020 |z 9812832238 
029 1 |a AU@  |b 000058360769 
029 1 |a DEBBG  |b BV043157914 
029 1 |a DEBBG  |b BV044175564 
029 1 |a DEBSZ  |b 384345808 
029 1 |a DEBSZ  |b 42128515X 
029 1 |a DEBSZ  |b 445575824 
029 1 |a GBVCP  |b 804523002 
035 |a (OCoLC)835162259  |z (OCoLC)820944566  |z (OCoLC)1058518799  |z (OCoLC)1086441248 
050 4 |a QA268 
072 7 |a COM  |x 031000  |2 bisacsh 
082 0 4 |a 003.54  |2 23 
049 |a UAMI 
111 2 |a International Workshop on Coding and Cryptology  |n (1st :  |d 2007 :  |c Wuyi Mountain, China) 
245 1 0 |a Coding and cryptology :  |b proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 /  |c edited by Yongqing Li [and others]. 
260 |a Singapore ;  |a London :  |b World Scientific,  |c 2008. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Series on coding theory and cryptology 
500 |a Title from PDF title page (viewed on Apr. 3, 2013). 
504 |a Includes bibliographical references and index. 
505 0 0 |t Fuzzy Identity-based Encryption: New and Efficient Schemes /  |r J. Baek, W. Susilo and J. Zhou --  |t A Functional View of Upper Bounds on Codes /  |r A. Barg and D. Nogin --  |t A Method of Construction of Balanced Functions with Optimum Algebraic Immunity /  |r C. Carlet --  |t Enumeration of a Class of Sequences Generated by Inversions /  |r A. Cesemlioglu, W. Meidl and A. Topuzoglu --  |t A Critical Look at Cryptographic Hash Function Literature /  |r S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz --  |t Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects /  |r Y.M. Chee and C.J. Colbourn --  |t An Improved Distinguisher for Dragon /  |r J.Y. Cho and J. Pieprzyk. 
520 |a Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Coding theory  |v Congresses. 
650 0 |a Cryptography  |v Congresses. 
650 0 |a Number theory  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 6 |a Cryptographie  |v Congrès. 
650 6 |a Théorie des nombres  |v Congrès. 
650 6 |a Sécurité informatique  |v Congrès. 
650 7 |a COMPUTERS  |x Information Theory.  |2 bisacsh 
650 7 |a Coding theory  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a Number theory  |2 fast 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Li, Yongqing. 
830 0 |a Series on coding theory and cryptology. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=521178  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 521178 
994 |a 92  |b IZTAP