GLOBECOM Tokyo '87
Author :
Publisher :
Page : 774 pages
File Size : 11,22 MB
Release : 1987
Category : Telecommunication
ISBN :
Author :
Publisher :
Page : 774 pages
File Size : 11,22 MB
Release : 1987
Category : Telecommunication
ISBN :
Author :
Publisher :
Page : 534 pages
File Size : 27,28 MB
Release : 1987
Category : Research
ISBN :
Author : M. Deza
Publisher : Springer Science & Business Media
Page : 436 pages
File Size : 24,18 MB
Release : 1996-08-07
Category : Computers
ISBN : 9783540615767
This book presents a collection of 33 strictly refereed full papers on combinatorics and computer science; these papers have been selected from the 54 papers accepted for presentation at the joint 8th Franco-Japanese and 4th Franco-Chinese Conference on Combinatorics in Computer Science, CCS '96, held in Brest, France in July 1995. The papers included in the book have been contributed by authors from 10 countries; they are organized in sections entitled graph theory, combinatorial optimization, selected topics, and parallel and distributed computing.
Author : Ivan Damgard
Publisher : Springer
Page : 257 pages
File Size : 48,49 MB
Release : 2003-06-29
Category : Computers
ISBN : 354048969X
This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptololgy. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology.
Author : Seon Jong Chung
Publisher : IOS Press
Page : 924 pages
File Size : 35,20 MB
Release : 1996
Category : Computer networks
ISBN : 9051992408
This work discusses the issues among people creating computer communication technology, the people using computer communication, the people impacted by it, and the regulators responsible for balancing the interest of these multiple groups.
Author : Edward Pyle Dawson
Publisher : Springer Science & Business Media
Page : 346 pages
File Size : 14,64 MB
Release : 1996-01-24
Category : Computers
ISBN : 9783540607595
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Author : Guy Pujolle
Publisher : Springer Science & Business Media
Page : 532 pages
File Size : 13,5 MB
Release : 2012-12-06
Category : Computers
ISBN : 3642764843
The main objective of this workshop was to review and discuss the state of the art and the latest advances· in the area of 1-10 Gbit/s throughput for local and metropolitan area networks. The first generation of local area networks had throughputs in the range 1-20 Mbit/s. Well-known examples of this first generation networks are the Ethernet and the Token Ring. The second generation of networks allowed throughputs in the range 100-200 Mbit/s. Representatives of this generation are the FDDI double ring and the DQDB (IEEE 802.6) networks. The third generation networks will have throughputs in the range 1-10 Gbit/s. The rapid development and deployment of fiber optics worldwide, as well as the projected emergence of a market for broadband services, have given rise to the development of broadband ISDN standards. Currently, the Asynchronous Transfer Mode (ATM) appears to be a viable solution to broadband networks. The possibility of all-optical networks in the future is being examined. This would allow the tapping of approximately 50 terahertz or so available in the lightwave range of the frequency spectrum. It is envisaged that using such a high-speed network it will be feasible to distribute high-quality video to the home, to carry out rapid retrieval of radiological and other scientific images, and to enable multi-media conferencing between various parties.
Author :
Publisher : Information Gatekeepers Inc
Page : 786 pages
File Size : 22,9 MB
Release : 1994
Category : Fiber optics
ISBN : 9781568511085
Author : Stelvio Cimato
Publisher : Springer Science & Business Media
Page : 374 pages
File Size : 48,41 MB
Release : 2003-01-21
Category : Computers
ISBN : 3540004203
This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002. The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing.
Author : IGIC, Inc. Staff
Publisher : Information Gatekeepers Inc
Page : 812 pages
File Size : 22,89 MB
Release : 1994
Category : Technology & Engineering
ISBN : 9781568510699