A Note About the Traceability Properties of Linear Codes
Identifieur interne : 005773 ( Istex/Corpus ); précédent : 005772; suivant : 005774A Note About the Traceability Properties of Linear Codes
Auteurs : Marcel Fernandez ; Josep Cotrina ; Miguel Soriano ; Neus DomingoSource :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2007.
Abstract
Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.
Url:
DOI: 10.1007/978-3-540-76788-6_20
Links to Exploration step
ISTEX:079E810651163439484C957B9342E895E57AB0FBLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author><name sortKey="Fernandez, Marcel" sort="Fernandez, Marcel" uniqKey="Fernandez M" first="Marcel" last="Fernandez">Marcel Fernandez</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Cotrina, Josep" sort="Cotrina, Josep" uniqKey="Cotrina J" first="Josep" last="Cotrina">Josep Cotrina</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Soriano, Miguel" sort="Soriano, Miguel" uniqKey="Soriano M" first="Miguel" last="Soriano">Miguel Soriano</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
<affiliation><mods:affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Domingo, Neus" sort="Domingo, Neus" uniqKey="Domingo N" first="Neus" last="Domingo">Neus Domingo</name>
<affiliation><mods:affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:079E810651163439484C957B9342E895E57AB0FB</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-76788-6_20</idno>
<idno type="url">https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">005773</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">005773</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author><name sortKey="Fernandez, Marcel" sort="Fernandez, Marcel" uniqKey="Fernandez M" first="Marcel" last="Fernandez">Marcel Fernandez</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Cotrina, Josep" sort="Cotrina, Josep" uniqKey="Cotrina J" first="Josep" last="Cotrina">Josep Cotrina</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Soriano, Miguel" sort="Soriano, Miguel" uniqKey="Soriano M" first="Miguel" last="Soriano">Miguel Soriano</name>
<affiliation><mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
<affiliation><mods:affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Domingo, Neus" sort="Domingo, Neus" uniqKey="Domingo N" first="Neus" last="Domingo">Neus Domingo</name>
<affiliation><mods:affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">079E810651163439484C957B9342E895E57AB0FB</idno>
<idno type="DOI">10.1007/978-3-540-76788-6_20</idno>
<idno type="ChapterID">20</idno>
<idno type="ChapterID">Chap20</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</div>
</front>
</TEI>
<istex><corpusName>springer</corpusName>
<author><json:item><name>Marcel Fernandez</name>
<affiliations><json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item><name>Josep Cotrina</name>
<affiliations><json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item><name>Miguel Soriano</name>
<affiliations><json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
<json:string>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item><name>Neus Domingo</name>
<affiliations><json:string>I.E.S. J.V Foix, Rubi. Barcelona, Spain</json:string>
</affiliations>
</json:item>
</author>
<language><json:string>eng</json:string>
</language>
<abstract>Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 > n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C ≤ c(n − d), such that any linear code is c-TA if c > n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</abstract>
<qualityIndicators><score>5.97</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>493</abstractCharCount>
<pdfWordCount>3402</pdfWordCount>
<pdfCharCount>15669</pdfCharCount>
<pdfPageCount>8</pdfPageCount>
<abstractWordCount>89</abstractWordCount>
</qualityIndicators>
<title>A Note About the Traceability Properties of Linear Codes</title>
<chapterId><json:string>20</json:string>
<json:string>Chap20</json:string>
</chapterId>
<serie><editor><json:item><name>David Hutchison</name>
</json:item>
<json:item><name>Takeo Kanade</name>
</json:item>
<json:item><name>Josef Kittler</name>
</json:item>
<json:item><name>Jon M. Kleinberg</name>
</json:item>
<json:item><name>Friedemann Mattern</name>
</json:item>
<json:item><name>John C. Mitchell</name>
</json:item>
<json:item><name>Moni Naor</name>
</json:item>
<json:item><name>Oscar Nierstrasz</name>
</json:item>
<json:item><name>C. Pandu Rangan</name>
</json:item>
<json:item><name>Bernhard Steffen</name>
</json:item>
<json:item><name>Madhu Sudan</name>
</json:item>
<json:item><name>Demetri Terzopoulos</name>
</json:item>
<json:item><name>Doug Tygar</name>
</json:item>
<json:item><name>Moshe Y. Vardi</name>
</json:item>
<json:item><name>Gerhard Weikum</name>
</json:item>
</editor>
<issn><json:string>0302-9743</json:string>
</issn>
<language><json:string>unknown</json:string>
</language>
<eissn><json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2007</copyrightDate>
</serie>
<host><editor><json:item><name>Kil-Hyun Nam</name>
</json:item>
<json:item><name>Gwangsoo Rhee</name>
</json:item>
</editor>
<subject><json:item><value>Computer Science</value>
</json:item>
<json:item><value>Computer Science</value>
</json:item>
<json:item><value>Data Encryption</value>
</json:item>
<json:item><value>Discrete Mathematics in Computer Science</value>
</json:item>
<json:item><value>Systems and Data Security</value>
</json:item>
<json:item><value>Management of Computing and Information Systems</value>
</json:item>
<json:item><value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item><value>Computer Communication Networks</value>
</json:item>
</subject>
<isbn><json:string>978-3-540-76787-9</json:string>
</isbn>
<language><json:string>unknown</json:string>
</language>
<eissn><json:string>1611-3349</json:string>
</eissn>
<title>Information Security and Cryptology - ICISC 2007</title>
<genre.original><json:string>Proceedings</json:string>
</genre.original>
<bookId><json:string>978-3-540-76788-6</json:string>
</bookId>
<volume>4817</volume>
<pages><last>258</last>
<first>251</first>
</pages>
<issn><json:string>0302-9743</json:string>
</issn>
<genre><json:string>Book Series</json:string>
</genre>
<eisbn><json:string>978-3-540-76788-6</json:string>
</eisbn>
<copyrightDate>2007</copyrightDate>
<doi><json:string>10.1007/978-3-540-76788-6</json:string>
</doi>
</host>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi><json:string>10.1007/978-3-540-76788-6_20</json:string>
</doi>
<id>079E810651163439484C957B9342E895E57AB0FB</id>
<score>1</score>
<fulltext><json:item><original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/pdf</uri>
</json:item>
<json:item><original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/tei"><teiHeader><fileDesc><titleStmt><title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt><authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability><p>SPRINGER</p>
</availability>
<date>2007</date>
</publicationStmt>
<sourceDesc><biblStruct type="inbook"><analytic><title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author><persName><forename type="first">Marcel</forename>
<surname>Fernandez</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
</author>
<author><persName><forename type="first">Josep</forename>
<surname>Cotrina</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
</author>
<author><persName><forename type="first">Miguel</forename>
<surname>Soriano</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</affiliation>
</author>
<author><persName><forename type="first">Neus</forename>
<surname>Domingo</surname>
</persName>
<affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</affiliation>
</author>
</analytic>
<monogr><title level="m">Information Security and Cryptology - ICISC 2007</title>
<title level="m" type="sub">10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</title>
<idno type="pISBN">978-3-540-76787-9</idno>
<idno type="eISBN">978-3-540-76788-6</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-76788-6</idno>
<idno type="BookID">978-3-540-76788-6</idno>
<idno type="BookTitleID">158070</idno>
<idno type="BookSequenceNumber">4817</idno>
<idno type="BookVolumeNumber">4817</idno>
<idno type="BookChapterCount">28</idno>
<editor><persName><forename type="first">Kil-Hyun</forename>
<surname>Nam</surname>
</persName>
</editor>
<editor><persName><forename type="first">Gwangsoo</forename>
<surname>Rhee</surname>
</persName>
</editor>
<imprint><publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2007"></date>
<biblScope unit="volume">4817</biblScope>
<biblScope unit="page" from="251">251</biblScope>
<biblScope unit="page" to="258">258</biblScope>
</imprint>
</monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<editor><persName><forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor><persName><forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor><persName><forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor><persName><forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor><persName><forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor><persName><forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor><persName><forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor><persName><forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor><persName><forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor><persName><forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor><persName><forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor><persName><forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor><persName><forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor><persName><forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor><persName><forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope><date>2007</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">079E810651163439484C957B9342E895E57AB0FB</idno>
<idno type="DOI">10.1007/978-3-540-76788-6_20</idno>
<idno type="ChapterID">20</idno>
<idno type="ChapterID">Chap20</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><creation><date>2007</date>
</creation>
<langUsage><language ident="en">en</language>
</langUsage>
<abstract xml:lang="en"><p>Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</p>
</abstract>
<textClass><keywords scheme="Book Subject Collection"><list><label>SUCO11645</label>
<item><term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass><keywords scheme="Book Subject Group"><list><label>I</label>
<label>I15033</label>
<label>I17028</label>
<label>I14050</label>
<label>I24067</label>
<label>I16021</label>
<label>I13022</label>
<item><term>Computer Science</term>
</item>
<item><term>Data Encryption</term>
</item>
<item><term>Discrete Mathematics in Computer Science</term>
</item>
<item><term>Systems and Data Security</term>
</item>
<item><term>Management of Computing and Information Systems</term>
</item>
<item><term>Algorithm Analysis and Problem Complexity</term>
</item>
<item><term>Computer Communication Networks</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc><change when="2007">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-19">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item><original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata><istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header"><istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document><Publisher><PublisherInfo><PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series><SeriesInfo SeriesType="Series" TocLevels="0"><SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader><EditorGroup><Editor><EditorName DisplayOrder="Western"><GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En"><BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0"><BookID>978-3-540-76788-6</BookID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
<BookSubTitle>10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4817</BookVolumeNumber>
<BookSequenceNumber>4817</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-76788-6</BookDOI>
<BookTitleID>158070</BookTitleID>
<BookPrintISBN>978-3-540-76787-9</BookPrintISBN>
<BookElectronicISBN>978-3-540-76788-6</BookElectronicISBN>
<BookChapterCount>28</BookChapterCount>
<BookCopyright><CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup><BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I15033" Priority="1" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I17028" Priority="2" Type="Secondary">Discrete Mathematics in Computer Science</BookSubject>
<BookSubject Code="I14050" Priority="3" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="I24067" Priority="4" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I16021" Priority="5" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I13022" Priority="6" Type="Secondary">Computer Communication Networks</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader><EditorGroup><Editor><EditorName DisplayOrder="Western"><GivenName>Kil-Hyun</GivenName>
<FamilyName>Nam</FamilyName>
</EditorName>
<Contact><Email>khnam@kndu.ac.kr</Email>
</Contact>
</Editor>
<Editor><EditorName DisplayOrder="Western"><GivenName>Gwangsoo</GivenName>
<FamilyName>Rhee</FamilyName>
</EditorName>
<Contact><Email>rhee@sookmyung.ac.kr</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part3"><PartInfo TocLevels="0"><PartID>3</PartID>
<PartSequenceNumber>3</PartSequenceNumber>
<PartTitle>Hash Functions – I</PartTitle>
<PartChapterCount>9</PartChapterCount>
<PartContext><SeriesID>558</SeriesID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
</PartContext>
</PartInfo>
<SubPart ID="SubPart6"><SubPartInfo><SubPartID>6</SubPartID>
<SubPartSequenceNumber>6</SubPartSequenceNumber>
<SubPartTitle>Copyright Protection</SubPartTitle>
<SubPartChapterCount>1</SubPartChapterCount>
</SubPartInfo>
<Chapter ID="Chap20" Language="En"><ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0"><ChapterID>20</ChapterID>
<ChapterDOI>10.1007/978-3-540-76788-6_20</ChapterDOI>
<ChapterSequenceNumber>20</ChapterSequenceNumber>
<ChapterTitle Language="En">A Note About the Traceability Properties of Linear Codes</ChapterTitle>
<ChapterFirstPage>251</ChapterFirstPage>
<ChapterLastPage>258</ChapterLastPage>
<ChapterCopyright><CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular"><MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext><SeriesID>558</SeriesID>
<PartID>3</PartID>
<BookID>978-3-540-76788-6</BookID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader><AuthorGroup><Author AffiliationIDS="Aff1"><AuthorName DisplayOrder="Western"><GivenName>Marcel</GivenName>
<FamilyName>Fernandez</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff1"><AuthorName DisplayOrder="Western"><GivenName>Josep</GivenName>
<FamilyName>Cotrina</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff1 Aff2"><AuthorName DisplayOrder="Western"><GivenName>Miguel</GivenName>
<FamilyName>Soriano</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff3"><AuthorName DisplayOrder="Western"><GivenName>Neus</GivenName>
<FamilyName>Domingo</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff1"><OrgName>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona</OrgName>
<OrgAddress><Country>Spain</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2"><OrgName>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona</OrgName>
<OrgAddress><Country>Spain</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3"><OrgName>I.E.S. J.V Foix, Rubi. Barcelona</OrgName>
<OrgAddress><Country>Spain</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En"><Heading>Abstract</Heading>
<Para>We characterize the traceability properties of linear codes. It is well known that any code of length <Emphasis Type="Italic">n</Emphasis>
and minimum distance <Emphasis Type="Italic">d</Emphasis>
is a <Emphasis Type="Italic">c</Emphasis>
-TA code if <Emphasis Type="Italic">c</Emphasis>
<Superscript>2</Superscript>
< <Emphasis Type="Italic">n</Emphasis>
/(<Emphasis Type="Italic">n</Emphasis>
− <Emphasis Type="Italic">d</Emphasis>
). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value <Emphasis Type="Italic">Z</Emphasis>
<Subscript><Emphasis Type="Italic">C</Emphasis>
</Subscript>
, with <Emphasis Type="Italic">n</Emphasis>
− <Emphasis Type="Italic">d</Emphasis>
≤ <Emphasis Type="Italic">Z</Emphasis>
<Subscript><Emphasis Type="Italic">C</Emphasis>
</Subscript>
≤ <Emphasis Type="Italic">c</Emphasis>
(<Emphasis Type="Italic">n</Emphasis>
− <Emphasis Type="Italic">d</Emphasis>
), such that any linear code is <Emphasis Type="Italic">c</Emphasis>
-TA if <Emphasis Type="Italic">c</Emphasis>
< <Emphasis Type="Italic">n</Emphasis>
/<Emphasis Type="Italic">Z</Emphasis>
<Subscript><Emphasis Type="Italic">C</Emphasis>
</Subscript>
. We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</SubPart>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6"><titleInfo lang="en"><title>A Note About the Traceability Properties of Linear Codes</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en"><title>A Note About the Traceability Properties of Linear Codes</title>
</titleInfo>
<name type="personal"><namePart type="given">Marcel</namePart>
<namePart type="family">Fernandez</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Josep</namePart>
<namePart type="family">Cotrina</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Miguel</namePart>
<namePart type="family">Soriano</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Neus</namePart>
<namePart type="family">Domingo</namePart>
<affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<originInfo><publisher>Springer Berlin Heidelberg</publisher>
<place><placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language><languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription><internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</abstract>
<relatedItem type="host"><titleInfo><title>Information Security and Cryptology - ICISC 2007</title>
<subTitle>10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal"><namePart type="given">Kil-Hyun</namePart>
<namePart type="family">Nam</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Gwangsoo</namePart>
<namePart type="family">Rhee</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo><copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject><genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject><genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I17028">Discrete Mathematics in Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-76788-6</identifier>
<identifier type="ISBN">978-3-540-76787-9</identifier>
<identifier type="eISBN">978-3-540-76788-6</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">158070</identifier>
<identifier type="BookID">978-3-540-76788-6</identifier>
<identifier type="BookChapterCount">28</identifier>
<identifier type="BookVolumeNumber">4817</identifier>
<identifier type="BookSequenceNumber">4817</identifier>
<identifier type="PartChapterCount">9</identifier>
<part><date>2007</date>
<detail type="part"><title>Hash Functions – I</title>
</detail>
<detail type="volume"><number>4817</number>
<caption>vol.</caption>
</detail>
<extent unit="pages"><start>251</start>
<end>258</end>
</extent>
</part>
<recordInfo><recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series"><titleInfo><title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal"><namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo><copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo><recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">079E810651163439484C957B9342E895E57AB0FB</identifier>
<identifier type="DOI">10.1007/978-3-540-76788-6_20</identifier>
<identifier type="ChapterID">20</identifier>
<identifier type="ChapterID">Chap20</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo><recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 005773 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 005773 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Istex |étape= Corpus |type= RBID |clé= ISTEX:079E810651163439484C957B9342E895E57AB0FB |texte= A Note About the Traceability Properties of Linear Codes }}
This area was generated with Dilib version V0.6.31. |