Visit our Christmas Gift Finder
Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings - Lecture Notes in Computer Science 1746 (Paperback)
  • Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings - Lecture Notes in Computer Science 1746 (Paperback)
zoom

Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings - Lecture Notes in Computer Science 1746 (Paperback)

(volume editor)
£62.99
Paperback 352 Pages / Published: 08/12/1999
  • We can order this

Usually dispatched within 3 weeks

  • This item has been added to your basket
The IMA conferences onCryptographyandCoding arenotonly a blend of these two aspects of information theory, but a blend of mathematics and engineering and of theoretical results and applications. The papers in this book show that the1999conferencewasnoexception. Indeed,weagainsawthemathematics- derlyingcryptographyanderrorcorrectingcodingbeing appliedto otheraspects ofcommunications,andwe alsosawclassicalmathematicalconcepts nding new applications in communications theory. As usual the conference was held at the Royal Agricultural College, Cirencester, shortly before Christmas - this time 20-22 December 1999. The papers appear in this book in the order in which they were presented, grouped into sessions,eachsessionbeginning with an invited paper. Theseinvited papers were intended to re?ect the invitees' views on the future of their subject - or more accurately where they intended to take it. Indeed the focus of the conf- encewas thefutureofcryptographyandcoding as seenthroughtheeyes ofyoung researchers. The r st group of papers is concerned with mathematical bounds, concepts, and constructions that form a common thread running through error corre- ing coding theory, cryptography, and codes for multiple access schemes. This is followed by a group of papers from a conference session concerned with app- cations. The papers range over various topics from arithmetic coding for data compression and encryption, through image coding, biometrics for authenti- tion, and access to broadcast channels, to photographic signatures for secure identi cation. The third set of papers deals with theoretical aspects of error c- recting coding, including graph and trellis decoding, turbo codes, convolution codes and low complexity soft decision decoding of Reed Solomon codes.

Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
ISBN: 9783540668879
Number of pages: 352
Weight: 1030 g
Dimensions: 233 x 155 x 17 mm
Edition: 1999 ed.

You may also be interested in...

Cybersecurity and Cyberwar
Added to basket
The Perfect Weapon
Added to basket
The Truth Machine
Added to basket
Exploding Data
Added to basket
£20.00
Hardback
Hello World
Added to basket
£18.99   £15.99
Hardback
The Cyber Effect
Added to basket
£10.99
Paperback
Hello World
Added to basket
£8.99
Paperback
Breaking and Entering
Added to basket
Surveillance Valley
Added to basket
£14.99
Paperback
Intercept
Added to basket
£8.99
Paperback
Official (ISC)2 Guide to the CISSP CBK
Added to basket
Data and Goliath
Added to basket
£12.99
Paperback
Creative Superpowers
Added to basket
Blockchain Basics
Added to basket

Reviews

Please sign in to write a review

Your review has been submitted successfully.