MULTIRECEIVER AUTHENTICATION CODES: MODELS, BOUNDS, AND CONSTRUCTIONS
Tamer Hashem Farag;
Abstract
Because wiser use of information often improves decisions, many companies today regard information as among their most important assets and consider the creative use of information to be a key of competitive strategy. Whether one is a teacher, lawyer, doctor, politician, manager, or corporate president, the main ingredient in the work involved is information-knowing how to get, how to develop, how to use, how to manage, how to protect, and how to disseminate [30].
Data is stored and processed in an electronic form, this technology of information
processing is very efficient. Computers are used to process these electronic processing, because it can perform a large variety of tasks, and it can store a huge amount of electronic data. In the last decade, the number of computers in use has exploded. For quite some time now, computers have been a crucial element in how we entertain and educate ourselves, and most importantly, how we do business.
Data is stored and processed in an electronic form, this technology of information
processing is very efficient. Computers are used to process these electronic processing, because it can perform a large variety of tasks, and it can store a huge amount of electronic data. In the last decade, the number of computers in use has exploded. For quite some time now, computers have been a crucial element in how we entertain and educate ourselves, and most importantly, how we do business.
Other data
| Title | MULTIRECEIVER AUTHENTICATION CODES: MODELS, BOUNDS, AND CONSTRUCTIONS | Other Titles | شفرات التثبت متعدد المستقبل : نماذج قيود وابنية | Authors | Tamer Hashem Farag | Issue Date | 2001 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| تامر هاشم فرج.pdf | 350.67 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.