Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Choose an application
This book is an introductory text on the combinatorial theory of finite geometry. It assumes only a basic knowledge of set theory and analysis, but soon leads the student to results at the frontiers of research. It begins with an elementary combinatorial approach to finite geometries based on finite sets of points and lines, and moves into the classical work on affine and projective planes. The next part deals with polar spaces, partial geometries, and generalised quadrangles. The revised edition contains an entirely new chapter on blocking sets in linear spaces, which highlights some of the most important applications of blocking sets from the initial game-theoretic setting to their recent use in cryptography. Extensive exercises at the end of each chapter ensure the usefulness of this book for senior undergraduate and beginning graduate students.
Choose an application
Choose an application
Choose an application
This 1994 text covers finite linear spaces. It contains all the important results that had been published up to the time of publication, and is designed to be used not only as a resource for researchers in this and related areas, but also as a graduate-level text. In eight chapters the authors introduce and review fundamental results, and go on to cover the major areas of interest in linear spaces. A combinatorial approach is used for the greater part of the book, but in the final chapter recent advances in group theory relating to finite linear spaces are presented. At the end of each chapter there is a set of exercises which are designed to test comprehension of the material, and there is also a section of problems for researchers. It will be an invaluable book for researchers in geometry and combinatorics as well as forming an excellent text for graduate students.
Choose an application
Choose an application
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the “best student paper” award. The award was given to Yang Cui from the U- versity of Tokyo for the paper “Tag-KEM from Set Partial Domain One-Way Permutations. ” In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled “Electronic Identity Cards: Threats and Opportunities. ” Mike Burmester’s talk was “Towards Provable - curity for Ubiquitous Applications. ” The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.
Computers --- Computer security --- Data protection --- Ordinateurs --- Sécurité informatique --- Protection de l'information (Informatique) --- Access control --- Congresses. --- Accès --- Contrôle --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur
Public key cryptography. --- Cryptography --- Mathematics. --- Public key cryptography --- Cryptography -- Mathematics
Choose an application
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3-5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the best student paper award. The award was given to Yang Cui from the U- versity of Tokyo for the paper Tag-KEM from Set Partial Domain One-Way Permutations. In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled Electronic Identity Cards: Threats and Opportunities. Mike Burmester's talk was Towards Provable - curity for Ubiquitous Applications. The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica management --- OS (operating system) --- computernetwerken --- informatietheorie
Listing 1 - 9 of 9 |
Sort by
|