Coding in diffusion-based molecular nanonetworks: A comprehensive survey
Diffusion-based molecular nanonetworks exploit the diffusion of molecules, eg, in free space
or in blood vessels, for the purpose of communication. This article comprehensively surveys …
or in blood vessels, for the purpose of communication. This article comprehensively surveys …
A fuzzy commitment scheme
A Juels, M Wattenberg - Proceedings of the 6th ACM conference on …, 1999 - dl.acm.org
We combine well-known techniques from the areas of error-correcting codes and
cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy …
cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy …
[图书][B] Introduction to coding theory
JH Van Lint - 1998 - books.google.com
It is gratifying that this textbook is still sufficiently popular to warrant a third edition. I have
used the opportunity to improve and enlarge the book. When the second edition was …
used the opportunity to improve and enlarge the book. When the second edition was …
[图书][B] Graphs, networks and algorithms
D Jungnickel, D Jungnickel - 2005 - Springer
XII Preface solution as efficiently as possible. Most of the problems we treat have a good
algorithmic solution, but we also show how even difficult problems can be treated (for …
algorithmic solution, but we also show how even difficult problems can be treated (for …
[图书][B] Hadamard matrices and their applications
KJ Horadam - 2012 - books.google.com
In Hadamard Matrices and Their Applications, KJ Horadam provides the first unified account
of cocyclic Hadamard matrices and their applications in signal and data processing. This …
of cocyclic Hadamard matrices and their applications in signal and data processing. This …
[图书][B] The art of error correcting coding
RH Morelos-Zaragoza - 2006 - books.google.com
Building on the success of the first edition, which offered a practical introductory approach to
the techniques of error concealment, this book, now fully revised and updated, provides a …
the techniques of error concealment, this book, now fully revised and updated, provides a …
Efficient helper data key extractor on FPGAs
Abstract Physical Unclonable Functions (PUFs) have properties that make them very
attractive for a variety of security-related applications. Due to their inherent dependency on …
attractive for a variety of security-related applications. Due to their inherent dependency on …
Skew-cyclic codes
D Boucher, W Geiselmann, F Ulmer - Applicable Algebra in Engineering …, 2007 - Springer
We generalize the notion of cyclic codes by using generator polynomials in (non
commutative) skew polynomial rings. Since skew polynomial rings are left and right …
commutative) skew polynomial rings. Since skew polynomial rings are left and right …
Laser communication transmitter and receiver design
DO Caplan - Journal of Optical and Fiber Communications Reports, 2007 - Springer
Free-space laser communication systems have the potential to provide flexible, high-speed
connectivity suitable for long-haul intersatellite and deep-space links. For these applications …
connectivity suitable for long-haul intersatellite and deep-space links. For these applications …