Stop the war!
Остановите войну!
for scientists:
default search action
Information Security, Coding Theory and Related Combinatorics 2011
- Dean Crnkovic, Vladimir D. Tonchev:
Information Security, Coding Theory and Related Combinatorics. NATO Science for Peace and Security Series - D: Information and Communication Security 29, IOS Press 2011, ISBN 978-1-60750-662-1 - Ivana Ilic, Spyros S. Magliveras:
Crypto applications of combinatorial group theory. 1-16 - Kenneth Matheis, Spyros S. Magliveras:
Generating rooted trees of m nodes uniformly at random. 17-26 - Spyros S. Magliveras, Tran van Trung, Wandi Wei:
On Jacobsthal Binary Sequences. 27-37 - Andreas Klein, Leo Storme:
Applications of finite geometry in coding theory and cryptography. 38-58 - Tony Shaska, Lubjana Beshaj:
The arithmetic of genus two curves. 59-98 - Charles J. Colbourn:
Covering arrays and hash families. 99-135 - K. T. Arasu:
Sequences and arrays with desirable correlation properties. 136-171 - Jennifer D. Key:
Permutation decoding for codes from designs, finite geometries and graphs. 172-201 - Jamshid Moori:
Finite Groups, Designs and Codes. 202-230 - Dean Crnkovic, Vedrana Mikulic Crnkovic, Bernardo Gabriel Rodrigues:
Designs, strongly regular graphs and codes constructed from some primitive groups. 231-252 - Willem H. Haemers:
Matrices for graphs, designs and codes. 253-277 - Clement W. H. Lam:
Finding error-correcting codes using computers. 278-284 - Masakazu Jimbo, Keisuke Shiromoto:
Quantum jump codes and related combinatorial designs. 285-311 - Hadi Kharaghani:
Unbiased Hadamard matrices and bases. 312-325 - Ryoh Fuji-Hara, Ying Miao:
Multi-structured designs and their applications. 326-362 - Mohan S. Shrikhande, Tariq A. Alraqad:
Recent results on families of symmetric designs and non-embeddable quasi-residual designs. 363-403 - Richard M. Wilson:
Codes and modules associated with designs and t-uniform hypergraphs. 404-436 - Vladimir D. Tonchev:
Finite geometry designs, codes, and Hamada's conjecture. 437-448
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.