Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
  • Language: en
  • Pages: 379

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007. The 33 revised full papers presented together with 8 invited papers were carefully reviewed and selected from 61 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
  • Language: en
  • Pages: 348

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

  • Type: Book
  • -
  • Published: 2006-01-13
  • -
  • Publisher: Springer

The 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.

Information Security and Privacy
  • Language: en
  • Pages: 413

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2010-09-24
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security.

Information Security and Privacy
  • Language: en
  • Pages: 480

Information Security and Privacy

This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009. The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation.

Sequences and Their Applications - SETA 2008
  • Language: en
  • Pages: 431

Sequences and Their Applications - SETA 2008

  • Type: Book
  • -
  • Published: 2008-09-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th International Conference on Sequences and Their Applications, SETA 2008, held in Lexington, KY, USA in September 2008. The 32 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on probabilistic methods and randomness properties of sequences; correlation; combinatorial and algebraic foundations; security aspects of sequences; algorithms; correlation of sequences over rings; nonlinear functions over finite fields.

Information Security and Privacy
  • Language: en
  • Pages: 475

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2011-07-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Advances in Biometrics
  • Language: en
  • Pages: 814

Advances in Biometrics

This book constitutes the refereed proceedings of the International Conference on Biometrics, ICB 2006, held in Hong Kong, China in January 2006. The book includes 104 revised full papers covering such areas of biometrics as the face, fingerprint, iris, speech and signature, biometric fusion and performance evaluation, gait, keystrokes, and more. In addition the results of the Face Authentication Competition (FAC 2006) are also announced in this volume.

Sequences and Their Applications - SETA 2004
  • Language: en
  • Pages: 463

Sequences and Their Applications - SETA 2004

  • Type: Book
  • -
  • Published: 2005-05-20
  • -
  • Publisher: Springer

This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24–28, 2004. The previous two conferences, SETA 1998 and SETA 2001, were held in Singapore and Bergen, Norway, respectively. These conferences are motivated by the many widespread applications of sequences in modern communication systems. These applications include pseudorandom sequences in spread spectrum systems, code-division multiple-access, stream ciphers in cryptography and several connections to coding theory. The Technical Program Committee of SETA 2004 received 59 submitted - pers, many more than the submissions to p...

Hadamard Matrices and Their Applications
  • Language: en
  • Pages: 280

Hadamard Matrices and Their Applications

In Hadamard Matrices and Their Applications, K. J. Horadam provides the first unified account of cocyclic Hadamard matrices and their applications in signal and data processing. This original work is based on the development of an algebraic link between Hadamard matrices and the cohomology of finite groups that was discovered fifteen years ago. The book translates physical applications into terms a pure mathematician will appreciate, and theoretical structures into ones an applied mathematician, computer scientist, or communications engineer can adapt and use. The first half of the book explains the state of our knowledge of Hadamard matrices and two important generalizations: matrices with ...

Information Security and Privacy
  • Language: en
  • Pages: 525

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2003-08-02
  • -
  • Publisher: Springer

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee...