9783642018138-3642018130-Coding and Cryptology: Second International Workshop, IWCC 2009 (Lecture Notes in Computer Science, 5557)

Coding and Cryptology: Second International Workshop, IWCC 2009 (Lecture Notes in Computer Science, 5557)

ISBN-13: 9783642018138
ISBN-10: 3642018130
Edition: 2009
Author: Chaoping Xing, Huaxiong Wang, Chao Li, Yeow Meng Chee, San Ling
Publication date: 2009
Publisher: Springer
Format: Paperback 283 pages
FREE US shipping

Book details

ISBN-13: 9783642018138
ISBN-10: 3642018130
Edition: 2009
Author: Chaoping Xing, Huaxiong Wang, Chao Li, Yeow Meng Chee, San Ling
Publication date: 2009
Publisher: Springer
Format: Paperback 283 pages

Summary

Coding and Cryptology: Second International Workshop, IWCC 2009 (Lecture Notes in Computer Science, 5557) (ISBN-13: 9783642018138 and ISBN-10: 3642018130), written by authors Chaoping Xing, Huaxiong Wang, Chao Li, Yeow Meng Chee, San Ling, was published by Springer in 2009. With an overall rating of 3.9 stars, it's a notable title among other Information Theory (Computer Science, Data Processing, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Encryption, Cryptography) books. You can easily purchase or rent Coding and Cryptology: Second International Workshop, IWCC 2009 (Lecture Notes in Computer Science, 5557) (Paperback) from BooksRun, along with many other new and used Information Theory books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book