Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction

Здесь есть возможность читать онлайн «Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cryptography, Information Theory, and Error-Correction: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cryptography, Information Theory, and Error-Correction»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century
Cryptography, Information Theory, and Error-Correction

Cryptography, Information Theory, and Error-Correction — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cryptography, Information Theory, and Error-Correction», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

464 468

465 469

466 470

467 471

468 472

469 473

470 474

471 475

472 476

473 477

474 478

475 479

476 480

477 481

478 482

479 483

480 484

481 485

482 486

483 487

484 488

485 489

486 490

487 491

488 492

489 493

490 494

491 495

492 496

493 497

494 498

495 499

496 500

497 501

498 502

499 503

500 504

501 505

502 506

503 507

504 508

505 509

506 510

507 511

508 512

509 513

510 514

511 515

512 516

513 517

514 518

515 519

516 520

517 521

518 522

519 523

520 524

521 525

522 526

523 527

524 528

525 529

526 530

527 531

528 532

529 533

530 535

531 536

532 537

533 538

534 539

535 540

536 541

537 542

538 543

539 544

540 545

541 546

542 547

543 549

544 550

545 551

546 552

547 553

548 554

549 555

550 556

551 557

552 558

553 559

554 560

555 561

556 562

557 563

558 564

559 565

560 566

561 567

562 568

563 569

564 570

565 571

566 572

567 573

568 574

569 575

570 576

571 577

572 578

573 579

574 580

575 581

576 582

577 583

578 584

579 585

580 586

581 587

582 588

583 589

584 590

585 591

586 592

587 593

588 594

589 595

590 596

591 597

592 598

593 599

594 600

595 601

596 602

597 603

598 604

599 605

600 606

601 607

602 607

603 608

604 609

605 610

606 611

607 612

608 613

609 614

610 615

611 616

612 617

613 618

614 619

615 620

616 621

617 622

618 623

619 624

620 625

621 626

622 627

623 628

624 629

625 630

626 631

627 632

628 633

629 634

630 635

631 636

632 637

633 638

634 639

635 640

636 641

637 643

638 644

639 645

640 646

641 647

642 648

643 649

644 650

645 651

646 652

647 653

648 654

649 655

650 656

651 657

652 659

653 660

654 661

SERIES PAGE TITLE

A complete list of titles in this series appears at the end of this volume.

WILEY SERIES IN DISCRETE MATHEMATICS AND OPTIMIZATION

AARTS AND KORST

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

AARTS AND LENSTRA

Local Search in Combinatorial Optimization

ALON AND SPENCER

The Probabilistic Method, Third Edition

ANDERSON AND NASH

Linear Programming in Infinite‐Dimensional Spaces: Theory and Application

ARLINGHAUS, ARLINGHAUS, AND HARARY

Graph Theory and Geography: An Interactive View E‐Book

AZENCOTT

Simulated Annealing: Parallelization Techniques

BARTHÉLEMY AND GUÉNOCHE

Trees and Proximity Representations

BAZARRA, JARVIS, AND SHERALI

Linear Programming and Network Flows

BRUEN AND FORCINITO

Cryptography, Information Theory, and Error‐Correction: A Handbook for the 21st Century

CHANDRU AND HOOKER

Optimization Methods for Logical Inference

CHONG AND Z.AK

An Introduction to Optimization, Fourth Edition

COFFMAN AND LUEKER

Probabilistic Analysis of Packing and Partitioning Algorithms

COOK, CUNNINGHAM, PULLEYBLANK, AND SCHRIJVER

Combinatorial Optimization

DASKIN

Network and Discrete Location: Modes, Algorithms and Applications

DINITZ AND STINSON

Contemporary Design Theory: A Collection of Surveys

DU AND KO

Theory of Computational Complexity, Second Edition

ERICKSON

Introduction to Combinatorics, Second Edition

GLOVER, KLINGHAM, AND PHILLIPS

Network Models in Optimization and Their Practical Problems

GOLSHTEIN AND TRETYAKOV

Modified Lagrangians and Monotone Maps in Optimization

GONDRAN AND MINOUX

Graphs and Algorithms (Translated by S. Vajda‐)

GRAHAM, ROTHSCHILD, AND SPENCER

Ramsey Theory, Second Edition

Cryptography, Information Theory and Error-Correction

A Handbook for the 21st Century

Second Edition

Aiden A. Bruen

Carleton UniversityOttawa, Canada

Mario A. Forcinito

AP Dynamics, Inc., andUniversity of CalgaryCalgary, Canada

James M. McQuillan

Western Illinois UniversityMacomb, United States

This second edition first published 2021 2021 John Wiley and Sons Inc - фото 20

This second edition first published 2021

© 2021 John Wiley and Sons, Inc.

Edition History

John Wiley & Sons, Inc. (1e, 2005)

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Aiden A. Bruen, Mario A. Forcinito, and James M. McQuillan to be identified as the authors of this work have been asserted in accordance with law.

Registered Office

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

Editorial Office

111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print‐on‐demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cryptography, Information Theory, and Error-Correction»

Представляем Вашему вниманию похожие книги на «Cryptography, Information Theory, and Error-Correction» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cryptography, Information Theory, and Error-Correction»

Обсуждение, отзывы о книге «Cryptography, Information Theory, and Error-Correction» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x