Search Books
3D Reconstruction from Mult… Camera Models and Fundament…

Combinatorial Designs for Authentication and Secrecy Codes (Foundations and Trends(r) in Communications and Information)

Author Michael Huber
Publisher Now Publishers Inc
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
75.00 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $90.75

✓ Usually ships in 24 hours

Share:
Book Details
Author(s)Michael Huber
ISBN / ASIN1601983581
ISBN-139781601983589
AvailabilityUsually ships in 24 hours
Sales Rank9,966,726
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Authenticity and secrecy are two crucial concepts in cryptography and information security. Although independent in their nature, certain applications require that both aspects hold simultaneously. In the case of unconditional, or information-theoretic, security, authentication and secrecy codes can be used to maximise the likelihood of detecting deception. The construction of such codes is of great importance and has been considered by many researchers over the last few decades. Combinatorial Designs for Authentication and Secrecy Codes describes in depth classical and current interconnections between combinatorial designs and authentication and secrecy codes. Moreover, it provides a tutorial overview on the theory of combinatorial designs. These fundamental discrete structures find applications in fields as diverse as error-correcting codes, statistical design of experiments, cryptography and information security, mobile and wireless communications, group testing algorithms in DNA screening, software and hardware testing, and interconnection networks. In particular, the last few years have witnessed an increasing body of work in the communications and information theory literature that makes substantial use of results in combinatorial design theory. Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security.
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View