|
|
Showing 1 - 1 of
1 matches in All Departments
Secret sharing schemes form one of the most important topic in
Cryptography. These protocols are used in many areas, applied
mathematics, computer science, electrical engineering. A secret is
divided into several pieces called shares. Each share is given to a
user of the system. Each user has no information about the secret,
but the secret can be retrieved by certain authorized coalition of
users.This book is devoted to such schemes inspired by Coding
Theory. The classical schemes of Shamir, Blakley, Massey are
recalled. Survey is made of research in Combinatorial Coding Theory
they triggered, mostly self-dual codes, and minimal codes.
Applications to engineering like image processing, and key
management of MANETs are highlighted.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Law@Work
A. Van Niekerk, N. Smit
Paperback
R1,367
R1,229
Discovery Miles 12 290
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, …
DVD
(1)
R260
Discovery Miles 2 600
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.