000 | 03500nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-540-48588-9 | ||
003 | DE-He213 | ||
005 | 20160624102036.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1994 gw | s |||| 0|eng d | ||
020 |
_a9783540485889 _9978-3-540-48588-9 |
||
024 | 7 |
_a10.1007/3-540-58265-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aError Control, Cryptology, and Speech Compression _h[electronic resource] : _bWorkshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers / _cedited by Andrew Chmora, Stephen B. Wicker. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1994. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1994. |
|
300 |
_aIX, 127 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v829 |
|
505 | 0 | _aAlgebraic aspects of key generation systems -- Susceptibility of digital signature schemes based on error-correcting codes to universal forgery -- On message protection in cryptosystems modelled as the generalized wire-tap channel II -- How to avoid the Sidel'nikov-Shestakov attack -- Linear algebra approach to secret sharing schemes -- Generalizations of the Griesmer bound -- Codes that correct two-dimensional burst errors -- Self-checking decoding algorithm for Reed-Solomon codes -- Partial unit memory codes on the base of subcodes of Hadamard codes -- On periodic (partial) unit memory codes with maximum free distance -- Concatenated codes with convolutional inner and outer codes -- Reduced-state decoding for trellis coded modulation on nonlinear intersymbol interference channels -- Tables of coverings for decoding by S-sets -- Periodicity of one-dimensional tilings -- Fast infinite response filtering for speech processing -- On trellis codes for linear predictive speech compression. | |
520 | _aThis volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international scientific community. Therefore, the results presented by Russian researchers and engineers at this first international workshop on this topic are of particular interest; their work defines the cutting edge of research in many areas of error control, cryptology, and speech recognition. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aCoding and Information Theory. |
700 | 1 |
_aChmora, Andrew. _eeditor. |
|
700 | 1 |
_aWicker, Stephen B. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540582656 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v829 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-58265-7 |
942 |
_2EBK6529 _cEBK |
||
999 |
_c35823 _d35823 |