Coding in diffusion-based molecular nanonetworks: A comprehensive survey

P Hofmann, JA Cabrera, R Bassoli, M Reisslein… - IEEE …, 2023 - ieeexplore.ieee.org
Diffusion-based molecular nanonetworks exploit the diffusion of molecules, eg, in free space
or in blood vessels, for the purpose of communication. This article comprehensively surveys …

A fuzzy commitment scheme

A Juels, M Wattenberg - Proceedings of the 6th ACM conference on …, 1999 - dl.acm.org
We combine well-known techniques from the areas of error-correcting codes and
cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy …

[图书][B] Introduction to coding theory

JH Van Lint - 1998 - books.google.com
It is gratifying that this textbook is still sufficiently popular to warrant a third edition. I have
used the opportunity to improve and enlarge the book. When the second edition was …

[图书][B] Graphs, networks and algorithms

D Jungnickel, D Jungnickel - 2005 - Springer
XII Preface solution as efficiently as possible. Most of the problems we treat have a good
algorithmic solution, but we also show how even difficult problems can be treated (for …

[图书][B] Hadamard matrices and their applications

KJ Horadam - 2012 - books.google.com
In Hadamard Matrices and Their Applications, KJ Horadam provides the first unified account
of cocyclic Hadamard matrices and their applications in signal and data processing. This …

[图书][B] Coding theory: a first course

S Ling, C Xing - 2004 - books.google.com
Preface page xi 1 Introduction 1 Exercises 4 2 Error detection, correction and decoding 5 2.1
Communication channels 5 2.2 Maximum likelihood decoding 8 2.3 Hamming distance 8 2.4 …

[图书][B] The art of error correcting coding

RH Morelos-Zaragoza - 2006 - books.google.com
Building on the success of the first edition, which offered a practical introductory approach to
the techniques of error concealment, this book, now fully revised and updated, provides a …

Efficient helper data key extractor on FPGAs

C Bösch, J Guajardo, AR Sadeghi, J Shokrollahi… - … and Embedded Systems …, 2008 - Springer
Abstract Physical Unclonable Functions (PUFs) have properties that make them very
attractive for a variety of security-related applications. Due to their inherent dependency on …

Skew-cyclic codes

D Boucher, W Geiselmann, F Ulmer - Applicable Algebra in Engineering …, 2007 - Springer
We generalize the notion of cyclic codes by using generator polynomials in (non
commutative) skew polynomial rings. Since skew polynomial rings are left and right …

Laser communication transmitter and receiver design

DO Caplan - Journal of Optical and Fiber Communications Reports, 2007 - Springer
Free-space laser communication systems have the potential to provide flexible, high-speed
connectivity suitable for long-haul intersatellite and deep-space links. For these applications …