Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised.It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes.It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas.Related Link(s)
Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised. It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes. It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas"--
Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised.It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes.It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas.Related Link(s)
This open access book presents multidisciplinary research on the cultural history, ethnic connectivity, and oceanic transportation of the ancient Indigenous Bai Yue (百越) in the prehistoric maritime region of southeast China and southeast Asia. In this maritime Frontier of China, historical documents demonstrate the development of the “barbarian” Bai Yue and Island Yi (岛夷) and their cultural interaction with the northern Huaxia (华夏) in early Chinese civilization within the geopolitical order of the “Central State-Four Peripheries Barbarians-Four Seas”. Archaeological typologies of the prehistoric remains reveal a unique cultural tradition dominantly originating from the local Paleolithic age and continuing to early Neolithization across this border region. Further analysis of material culture from the Neolithic to the Early Iron Age proves the stability and resilience of the indigenous cultures even with the migratory expansion of Huaxia and Han (汉) from north to south. Ethnographical investigations of aboriginal heritage highlight their native cultural context, seafaring technology and navigation techniques, and their interaction with Austronesian and other foreign maritime ethnicities. In a word, this manuscript presents a new perspective on the unique cultural landscape of indigenous ethnicities in southeast China with thousands of years’ stable tradition, a remarkable maritime orientation and overseas cultural hybridization in the coastal region of southeast China.
This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing Contains information on cryptographic primitives and electronic warfare Includes problems at the end of each chapter to enhance learning. This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs. This chapter classifies wireless network security threats into one of nine categories: Errors and omissions; fraud and theft committed by authorized or unauthorized users of the system; employee sabotage; loss of physical and infrastructure support; malicious hackers; industrial espionage; malicious code; foreign government espionage; and, threats to personal privacy. All of the preceding represent potential threats to wireless networks. However, the more immediate concerns for wireless communications are fraud and theft, malicious hackers, malicious code, and industrial and foreign espionage. Theft is likely to occur with wireless devices due to their portability. Authorized and unauthorized users of the system may commit fraud and theft; however, the former are more likely to carry out such acts. Since users of a system may know what resources a system has and the system security flaws, it is easier for them to commit fraud and theft. Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm. Malicious hackers are generally individuals from outside of an organization (although users within an organization can be a threat as well). Such hackers may gain access to the wireless network access point by eavesdropping on wireless device communications. Malicious code involves viruses, worms, Trojan horses, logic bombs, or other unwanted software that is designed to damage files or bring down a system. Industrial and foreign espionage involve gathering proprietary data from corporations or intelligence information from governments through eavesdropping. In wireless networks, the espionage threat stems from the relative ease in which eavesdropping can occur on radio transmissions. This chapter provides an overview of wireless networking security technologies most commonly used in an office environment and by the mobile workforce of today. Also, this chapter seeks to assist organizations in reducing the risks associated with 802.11 wireless LANs, cellular networks, wireless ad hoc networks and for ensuring security when using handheld devices.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.