Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Combinatorial Designs for Authentication and Secrecy Codes
Foyalty 212

Combinatorial Designs for Authentication and Secrecy Codes (Paperback)

Currently unavailable. Foyles can order for despatch to customer when the publisher is re-supplied on 01/05/2010.
Email me when back in stock


Authenticity and secrecy are two crucial concepts in cryptography and information security. Although independent in their nature, certain applications require that both aspects hold simultaneously. In the case if unconditional, or information-theoretic, security authentication and secrecy codes can be used to maximise the likelihood of detecting deception. The construction of such codes is of great importance and has been considered by many researchers over the last few decades. Combinatorial Designs for Authentication and Secrecy Codes describes in depth classical and current interconnections between combinatorial designs and authentication and secrecy codes. Moreover, it provides a tutorial overview on the theory of combinatorial designs. These fundamental discrete structures find applications in fields as diverse as error-correcting codes, statistical design of experiments, cryptography and information security, mobile and wireless communications, group testing algorithms in DNA screening, software and hardware testing, and interconnection networks.

In particular, the last few years have witnessed an increasing body of work in the communications and information theory literature that makes substantial use of results in combinatorial design theory. Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security.

Computing & ITComputer scienceSystems analysis & designComputing & ITComputer securityData encryptionReference & ResearchResearch & information: generalCoding theory & cryptologyTechnicalEngineering & General TechnologyEngineering: general Publisher: now publishers Inc Publication Date: 01/05/2010 ISBN-13: 9781601983589  Details: Type: Paperback Format: Books
Availability: Currently unavailable. Foyles can order for despatch to customer when the publisher is re-supplied on 01/05/2010.  

More books by Michael Huber

Leave Review


Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Advances of DNA Computing in...
Suyel Namasudra; Ganesh Chandra Deka
Fundamentals of Digital Forensics:...
Joakim Kavrestad
Exploding Data: Reclaiming Our Cyber...
Michael Chertoff
Introduction to Cryptography
Sahadeo Padhye; Rajeev A. Sahu; ...
© W&G Foyle Ltd
Foyles uses cookies to help ensure your experience on our site is the best possible. Click here if you’d like to find out more about the types of cookies we use.
Accept and Close