Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
Ergodic theory. Information theory --- Office management --- Applied marketing --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- e-business --- informatica --- bedrijfsadministratie --- e-commerce --- computerbeveiliging --- informatica management --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- informatietheorie
Choose an application
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs. The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine issues and problems still open for future research in this area.
Spectrometric and optical chemical analysis --- Electronics --- Mass communications --- Computer. Automation --- beeldverwerking --- informatica --- elektronica --- communicatietechnologie --- fysicochemie --- signaalverwerking --- spectrometrie
Listing 1 - 4 of 4 |
Sort by
|