Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Orthogonal designs have proved fundamental to constructing code division multiple antenna systems for more efficient mobile communications. Starting with basic theory, this book develops the algebra and combinatorics to create new communications modes. Intended primarily for researchers, it is also useful for graduate students wanting to understand some of the current communications coding theories.
Mathematics. --- Matrix theory. --- Algebra. --- Computer mathematics. --- Combinatorics. --- Linear and Multilinear Algebras, Matrix Theory. --- Signal, Image and Speech Processing. --- Computational Mathematics and Numerical Analysis. --- Orthogonal polynomials --- Data processing. --- Fourier analysis --- Functions, Orthogonal --- Polynomials --- Computer science --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Combinatorics --- Algebra --- Mathematical analysis --- Mathematics --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Computer security --- Data encryption (Computer science). --- Information Systems. --- Computer security. --- Computer Communication Networks. --- Coding theory. --- Computer software. --- Cryptology. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Computer systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Management information systems. --- Computer science. --- Computer communication systems. --- Information theory. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Data protection --- Computer security --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Application software. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Coding and Information Theory. --- Computer Appl. in Administrative Data Processing. --- e-Commerce/e-business. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Information Systems. --- Information systems. --- Cryptology. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Listing 1 - 3 of 3 |
Sort by
|