


default search action
Information Security, Coding Theory and Related Combinatorics 2011
- Dean Crnkovic, Vladimir D. Tonchev:

Information Security, Coding Theory and Related Combinatorics. NATO Science for Peace and Security Series - D: Information and Communication Security 29, IOS Press 2011, ISBN 978-1-60750-662-1 - Ivana Ilic, Spyros S. Magliveras:

Crypto applications of combinatorial group theory. 1-16 - Kenneth Matheis, Spyros S. Magliveras:

Generating rooted trees of m nodes uniformly at random. 17-26 - Spyros S. Magliveras, Tran van Trung, Wandi Wei:

On Jacobsthal Binary Sequences. 27-37 - Andreas Klein, Leo Storme:

Applications of finite geometry in coding theory and cryptography. 38-58 - Tony Shaska

, Lubjana Beshaj:
The arithmetic of genus two curves. 59-98 - Charles J. Colbourn:

Covering arrays and hash families. 99-135 - K. T. Arasu:

Sequences and arrays with desirable correlation properties. 136-171 - Jennifer D. Key:

Permutation decoding for codes from designs, finite geometries and graphs. 172-201 - Jamshid Moori:

Finite Groups, Designs and Codes. 202-230 - Dean Crnkovic, Vedrana Mikulic Crnkovic

, Bernardo Gabriel Rodrigues:
Designs, strongly regular graphs and codes constructed from some primitive groups. 231-252 - Willem H. Haemers:

Matrices for graphs, designs and codes. 253-277 - Clement W. H. Lam:

Finding error-correcting codes using computers. 278-284 - Masakazu Jimbo, Keisuke Shiromoto:

Quantum jump codes and related combinatorial designs. 285-311 - Hadi Kharaghani:

Unbiased Hadamard matrices and bases. 312-325 - Ryoh Fuji-Hara, Ying Miao:

Multi-structured designs and their applications. 326-362 - Mohan S. Shrikhande, Tariq A. Alraqad:

Recent results on families of symmetric designs and non-embeddable quasi-residual designs. 363-403 - Richard M. Wilson:

Codes and modules associated with designs and t-uniform hypergraphs. 404-436 - Vladimir D. Tonchev:

Finite geometry designs, codes, and Hamada's conjecture. 437-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














