Narrow your search

Library

ULiège (4)

VUB (4)

KU Leuven (2)

UGent (2)

EhB (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

More...

Resource type

book (9)


Language

English (9)


Year
From To Submit

2013 (1)

2006 (2)

1997 (2)

1993 (3)

1986 (1)

Listing 1 - 9 of 9
Sort by
Combinatorics of finite geometries
Author:
ISBN: 0521318572 0521267641 Year: 1986 Publisher: Cambridge Cambridge University press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Combinatorics of finite geometries
Author:
ISBN: 0511665601 Year: 1997 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is an introductory text on the combinatorial theory of finite geometry. It assumes only a basic knowledge of set theory and analysis, but soon leads the student to results at the frontiers of research. It begins with an elementary combinatorial approach to finite geometries based on finite sets of points and lines, and moves into the classical work on affine and projective planes. The next part deals with polar spaces, partial geometries, and generalised quadrangles. The revised edition contains an entirely new chapter on blocking sets in linear spaces, which highlights some of the most important applications of blocking sets from the initial game-theoretic setting to their recent use in cryptography. Extensive exercises at the end of each chapter ensure the usefulness of this book for senior undergraduate and beginning graduate students.


Book
Combinatorics of finite geometries
Author:
ISBN: 9780511665608 9780521590143 9780521599931 Year: 1997 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

The theory of finite linear spaces : combinatorics of points and lines
Authors: ---
ISBN: 0521333172 Year: 1993 Publisher: Cambridge : Cambridge university press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Vector spaces.


Book
The theory of finite linear spaces : combinatorics of points and lines
Authors: ---
ISBN: 0511666918 Year: 1993 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This 1994 text covers finite linear spaces. It contains all the important results that had been published up to the time of publication, and is designed to be used not only as a resource for researchers in this and related areas, but also as a graduate-level text. In eight chapters the authors introduce and review fundamental results, and go on to cover the major areas of interest in linear spaces. A combinatorial approach is used for the greater part of the book, but in the final chapter recent advances in group theory relating to finite linear spaces are presented. At the end of each chapter there is a set of exercises which are designed to test comprehension of the material, and there is also a section of problems for researchers. It will be an invaluable book for researchers in geometry and combinatorics as well as forming an excellent text for graduate students.

Keywords

Vector spaces.


Book
The theory of finite linear spaces
Authors: ---
ISBN: 9780511666919 9780521333177 9780521114189 Year: 1993 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
Authors: --- --- ---
ISBN: 9783540354581 3540354581 354035459X Year: 2006 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the “best student paper” award. The award was given to Yang Cui from the U- versity of Tokyo for the paper “Tag-KEM from Set Partial Domain One-Way Permutations. ” In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled “Electronic Identity Cards: Threats and Opportunities. ” Mike Burmester’s talk was “Towards Provable - curity for Ubiquitous Applications. ” The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.

Keywords

Computers --- Computer security --- Data protection --- Ordinateurs --- Sécurité informatique --- Protection de l'information (Informatique) --- Access control --- Congresses. --- Accès --- Contrôle --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Public key cryptography
Authors: --- ---
ISBN: 1283960524 111848231X 9781118482261 9781118317129 9781118482315 1118482263 Year: 2013 Publisher: Hoboken, New Jersey [Piscataqay, New Jersey] John Wiley & Sons IEEE Xplore

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur


Book
Information Security and Privacy : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings
Authors: --- ---
ISBN: 9783540354598 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3-5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the best student paper  award. The award was given to Yang Cui from the U- versity of Tokyo for the paper Tag-KEM from Set Partial Domain One-Way Permutations.  In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled Electronic Identity Cards: Threats and Opportunities.  Mike Burmester's talk was Towards Provable - curity for Ubiquitous Applications.  The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.

Listing 1 - 9 of 9
Sort by