Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007
| Main Author: | Galbraith, Steven D. (Author) |
|---|---|
| Corporate Author: | IMA International Conference (11th : 2007 : Cirencester, England) |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4887 |
| Subjects: | |
| Online Access: | Publisher description |
Similar Items
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2008)
by: Hoffstein, Jeffrey, et al.
Published: (2008)
Source and channel coding an algorithmic approach
by: Anderson, John B. 1945-, et al.
Published: (1991)
by: Anderson, John B. 1945-, et al.
Published: (1991)
Coding theory & its applications
by: Harter, Latoria
Published: (2012)
by: Harter, Latoria
Published: (2012)
Information theory coding theorems for discrete memoryless systems
by: Csisza'r, Imre 1938-, et al.
Published: (2011)
by: Csisza'r, Imre 1938-, et al.
Published: (2011)
Error-control coding for computer systems
by: Rao, T. R. N. (Thammavarapu R. N.), et al.
Published: (1989)
by: Rao, T. R. N. (Thammavarapu R. N.), et al.
Published: (1989)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Noiseless steganography the key to covert communications
by: Desoky, Abdelrahman
Published: (2012)
by: Desoky, Abdelrahman
Published: (2012)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Near-capacity variable-length coding regular and exit-cart-aided irregular designs
by: Hanzo, Lajos 1952-
Published: (2011)
by: Hanzo, Lajos 1952-
Published: (2011)
A student's guide to coding and information theory
by: Moser, Stefan M., et al.
Published: (2012)
by: Moser, Stefan M., et al.
Published: (2012)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Basics of communications and coding
by: Chambers, William G.
Published: (1985)
by: Chambers, William G.
Published: (1985)
Contemporary coding techniques and applications for mobile communications
by: Osman, Onur, et al.
Published: (2009)
by: Osman, Onur, et al.
Published: (2009)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
The Unicode standard 5.0 the unicode consortium
by: Allen, Julie D.
Published: (2007)
by: Allen, Julie D.
Published: (2007)
Teori maklumat dan pengekodan
by: Abramson, Norman 1932-, et al.
Published: (1990)
by: Abramson, Norman 1932-, et al.
Published: (1990)
Code quality : the open source perspective
by: Spinellis, Diomidis
Published: (2006)
by: Spinellis, Diomidis
Published: (2006)
Channel coding theory, algorithms, and applications
Published: (2014)
Published: (2014)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Bar codes design, printing & quality control
by: Erdei, William H.
Published: (1993)
by: Erdei, William H.
Published: (1993)
Modulation and coding techniques in wireless communications
by: Krouk, Evgenii, et al.
Published: (2011)
by: Krouk, Evgenii, et al.
Published: (2011)
Working papers of Seminar on EAN International using bar code technology to enhance business efficiency
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Entropy and information theory
by: Gray, Robert M. 1943-
Published: (2011)
by: Gray, Robert M. 1943-
Published: (2011)
Formal concept analysis 6th international conference, ICFCA 2008, Montreal, Canada, February 25-28, 2008 ; proceedings
by: Medina, Raoul, et al.
Published: (2008)
by: Medina, Raoul, et al.
Published: (2008)
The Cambridge handbook of linguistic code-switching
by: Bullock, Barbara E., et al.
Published: (2009)
by: Bullock, Barbara E., et al.
Published: (2009)
The Cambridge handbook of linguistics code-switching
by: Bullock, Barbara E., et al.
Published: (2012)
by: Bullock, Barbara E., et al.
Published: (2012)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Similar Items
-
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014) -
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2008) -
Source and channel coding an algorithmic approach
by: Anderson, John B. 1945-, et al.
Published: (1991) -
Coding theory & its applications
by: Harter, Latoria
Published: (2012) -
Information theory coding theorems for discrete memoryless systems
by: Csisza'r, Imre 1938-, et al.
Published: (2011)