E-books in Russian and English



<<< >>>

Welcome
(Seattle, Washington, United States)

 


Enter · Register · Search

 
 
   
 
 
 
« Июнь 2009 »
Пн Вт Ср Чт Пт Сб Вс
1234567
891011121314
15161718192021
22232425262728
2930 
 
One Week Top10:
 2  3   4

date: 4 июня 2009 / author: izograv / views: 821 / comments: 0

Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007 (Coding Theory and Crytology) by Yongqing Li, San Ling, Harald Niederreiter, and Huaxiong Wang



The rst International Workshop on Coding and Cryptology was held in Wuyi
Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by
Fujian Normal University, China and Nanyang Technological University, Singapore.
We acknowledge with gratitude the nancial support from the Key Laboratory of
Network Security and Cryptology, Fujian Normal University.

The idea for this workshop grew out of the recognition of the recent development
in various areas of coding theory and cryptology. Over the past years, we have
seen the rapid growth of the Internet and World-Wide- Web, they have provided
great opportunities for online commercial activities, business transactions and
government services over open computer and communications networks. However,
such developments are only possible if communications can be conducted in a
secure and reliable way. The mathematical theory and practice of coding theory
and cryptology underpin the provision of e ective security and reliability for
data communication, processing and storage. Theoretical and practical advances
in the elds are therefore a key factor in facilitating the growth of data
communications and data networks.

The aim of the workshop was to bring experts from coding theory, cryptology and
their related areas for a fruitful exchange of ideas. We hoped (and achieved)
the meeting would encourage and stimulate further research in
telecommunications, information and computer security, the design and
implementation of coding-related cryptosystems and other related areas. Another
goal of the meeting was to stimulate collaboration and more active interaction
between mathematicians, computer scientists, practical cryptographers and
engineers.

This workshop post-proceedings consists of 20 papers submitted by the invited
speakers of the workshop, each paper has been reviewed by at least two referees.
They cover a wide range of topics in coding theory and cryptology such as
theory, techniques, applications, practical experiences. They contain signi cant
advances in the areas as well as very useful surveys.

 

Comments: 0

 
 
Year Top:
2011
2010
2009
2008
2007
2006
 
  

 


 

Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget