1325 results in Communications, Information Theory and Security
Appendix Q (Chapter 19) - Quantum Fourier transform circuit
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 644-647
-
- Chapter
- Export citation
2 - Probability distributions
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 20-36
-
- Chapter
- Export citation
Contents
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp v-x
-
- Chapter
- Export citation
Appendix T (Chapter 20) - Modular arithmetic and Euler's theorem
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 656-659
-
- Chapter
- Export citation
20 - Shor's factorization algorithm
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 399-430
-
- Chapter
- Export citation
17 - Quantum measurements
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 333-355
-
- Chapter
- Export citation
Appendix V (Chapter 21) - Schmidt decomposition of joint pure states
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 662-663
-
- Chapter
- Export citation
Introduction
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp xvii-xx
-
- Chapter
- Export citation
21 - Quantum information theory
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 431-456
-
- Chapter
- Export citation
Appendix X (Chapter 21) - Holevo bound
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 666-671
-
- Chapter
- Export citation
6 - Differential entropy
-
- Book:
- Classical and Quantum Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 19 February 2009, pp 84-95
-
- Chapter
- Export citation
3 - Cryptographic algorithms and security primitives
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 35-56
-
- Chapter
- Export citation
4 - Wireless IP network access control
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 57-92
-
- Chapter
- Export citation
References
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 199-201
-
- Chapter
- Export citation
Index
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 202-212
-
- Chapter
- Export citation
5 - Local IP subnet configuration and address resolution security
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 93-129
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp i-iv
-
- Chapter
- Export citation
6 - Security for global IP mobility
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp 130-168
-
- Chapter
- Export citation
Wireless Internet Security
- Architecture and Protocols
-
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008
Acknowledgements
-
- Book:
- Wireless Internet Security
- Published online:
- 06 July 2010
- Print publication:
- 02 October 2008, pp x-x
-
- Chapter
- Export citation