Editore: Springer International Publishing, Springer International Publishing Apr 2016, 2016
ISBN 10: 3319315137 ISBN 13: 9783319315133
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 106,99
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware -Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon¿s historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of ¿oblivious transfer¿ is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede¿s lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presentedin this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 372 pp. Englisch.
Editore: Springer International Publishing, 2016
ISBN 10: 3319315137 ISBN 13: 9783319315133
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 106,99
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of 'oblivious transfer' is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presentedin this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 117,39
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Editore: Springer International Publishing, Springer International Publishing Apr 2018, 2018
ISBN 10: 3319810553 ISBN 13: 9783319810553
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 117,69
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon¿s historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of ¿oblivious transfer¿ is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede¿s lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presentedin this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 372 pp. Englisch.
Editore: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319810553 ISBN 13: 9783319810553
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 117,69
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of 'oblivious transfer' is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presentedin this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 129,90
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Books Puddle, New York, NY, U.S.A.
EUR 133,89
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 372.
Da: Revaluation Books, Exeter, Regno Unito
EUR 157,08
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 370 pages. 9.25x6.10x1.02 inches. In Stock.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 104,47
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 113,30
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 170,76
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Like New. Like New. book.
Editore: Springer International Publishing, 2016
ISBN 10: 3319315137 ISBN 13: 9783319315133
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 89,99
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Written by a well-known author Useful as a self-study guide Focuses on selected topicsRudolf Ahlswede (1938 - 2010) studied Mathematics in Goettingen, and held postdoc positions in Erlangen, Germany and Ohio, USA. From 1977 on he .
Editore: Springer International Publishing, 2018
ISBN 10: 3319810553 ISBN 13: 9783319810553
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 98,54
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Written by a well-known author Useful as a self-study guide Focuses on selected topicsRudolf Ahlswede (1938 - 2010) studied Mathematics in Goettingen, and held postdoc positions in Erlangen, Germany and Ohio, USA. From 1977 on he .
Editore: Springer International Publishing Apr 2016, 2016
ISBN 10: 3319315137 ISBN 13: 9783319315133
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 106,99
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of 'oblivious transfer' is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms. 372 pp. Englisch.
Editore: Springer International Publishing Apr 2018, 2018
ISBN 10: 3319810553 ISBN 13: 9783319810553
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 117,69
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of 'oblivious transfer' is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated.This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory.Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights.Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph.D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms. 372 pp. Englisch.
Da: Majestic Books, Hounslow, Regno Unito
EUR 139,18
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 372.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 143,59
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 372.