MULTIRECEIVER AUTHENTICATION CODES: MODELS, BOUNDS, AND CONSTRUCTIONS

Tamer Hashem Farag;

Abstract


Because wiser use of information often improves decisions, many companies today regard information as among their most important assets and consider the creative use of information to be a key of competitive strategy. Whether one is a teacher, lawyer, doctor, politician, manager, or corporate president, the main ingredient in the work involved is information-knowing how to get, how to develop, how to use, how to manage, how to protect, and how to disseminate [30].
Data is stored and processed in an electronic form, this technology of information

processing is very efficient. Computers are used to process these electronic processing, because it can perform a large variety of tasks, and it can store a huge amount of electronic data. In the last decade, the number of computers in use has exploded. For quite some time now, computers have been a crucial element in how we entertain and educate ourselves, and most importantly, how we do business.


Other data

Title MULTIRECEIVER AUTHENTICATION CODES: MODELS, BOUNDS, AND CONSTRUCTIONS
Other Titles شفرات التثبت متعدد المستقبل : نماذج قيود وابنية
Authors Tamer Hashem Farag
Issue Date 2001

Attached Files

File SizeFormat
تامر هاشم فرج.pdf350.67 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 2 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.