{"title":"Key Reconciliation, Linear Codes, and New Algorithms","authors":"","doi":"10.1002/9781119582397.ch24","DOIUrl":"https://doi.org/10.1002/9781119582397.ch24","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127649615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nomber, J. Kaźmierczak, E. Maruszewska, E. Milewska, K. Hermann, Witold Biały, Agata Juszczak-Wiśniewska, M. Ligarski, D. Książek, M. Stępień, Barbara Białecka, ŁY WitoldBIA
{"title":"Review Problems and Solutions","authors":"Nomber, J. Kaźmierczak, E. Maruszewska, E. Milewska, K. Hermann, Witold Biały, Agata Juszczak-Wiśniewska, M. Ligarski, D. Książek, M. Stępień, Barbara Białecka, ŁY WitoldBIA","doi":"10.1002/9781119582397.ch29","DOIUrl":"https://doi.org/10.1002/9781119582397.ch29","url":null,"abstract":"The main purpose of this paper is the attempt to assess the currently existing system of monitoring of activities in the field of industrial waste management. The article characterized the state of industrial waste management in Poland in recent years and listed the main groups of waste and main areas of their application. In the paper there is the role of waste monitoring and the description of tasks of different entities in the field of control and supervision of waste management. Moreover, the paper shows the structure of waste monitoring and describes the system of waste monitoring in Poland, and presents the IT systems that supporting the work of supervisory authorities as well.","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT, The Internet of Things","authors":"김종영","doi":"10.1002/9781119582397.ch27","DOIUrl":"https://doi.org/10.1002/9781119582397.ch27","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channels, Capacity, the Fundamental Theorem","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.CH12","DOIUrl":"https://doi.org/10.1002/9781118033296.CH12","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117280836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perfect Secrecy: The New Paradigm","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.ch15","DOIUrl":"https://doi.org/10.1002/9781118033296.ch15","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Variables and Entropy","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.CH10","DOIUrl":"https://doi.org/10.1002/9781118033296.CH10","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"28 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127620976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Historical Introduction and the Life and Work of Claude E. Shannon","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.ch1","DOIUrl":"https://doi.org/10.1002/9781118033296.ch1","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128718747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General and Mathematical Attacks in Cryptography","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.CH7","DOIUrl":"https://doi.org/10.1002/9781118033296.CH7","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fundamentals of Modern Cryptography","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.CH4","DOIUrl":"https://doi.org/10.1002/9781118033296.CH4","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shift Registers (LFSR) and Stream Ciphers","authors":"A. Bruen, M. Forcinito","doi":"10.1002/9781118033296.ch16","DOIUrl":"https://doi.org/10.1002/9781118033296.ch16","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}