Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

A Note About the Traceability Properties of Linear Codes

Identifieur interne : 005773 ( Istex/Corpus ); précédent : 005772; suivant : 005774

A Note About the Traceability Properties of Linear Codes

Auteurs : Marcel Fernandez ; Josep Cotrina ; Miguel Soriano ; Neus Domingo

Source :

RBID : ISTEX:079E810651163439484C957B9342E895E57AB0FB

Abstract

Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C  ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.

Url:
DOI: 10.1007/978-3-540-76788-6_20

Links to Exploration step

ISTEX:079E810651163439484C957B9342E895E57AB0FB

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author>
<name sortKey="Fernandez, Marcel" sort="Fernandez, Marcel" uniqKey="Fernandez M" first="Marcel" last="Fernandez">Marcel Fernandez</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Cotrina, Josep" sort="Cotrina, Josep" uniqKey="Cotrina J" first="Josep" last="Cotrina">Josep Cotrina</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Soriano, Miguel" sort="Soriano, Miguel" uniqKey="Soriano M" first="Miguel" last="Soriano">Miguel Soriano</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Domingo, Neus" sort="Domingo, Neus" uniqKey="Domingo N" first="Neus" last="Domingo">Neus Domingo</name>
<affiliation>
<mods:affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:079E810651163439484C957B9342E895E57AB0FB</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-76788-6_20</idno>
<idno type="url">https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">005773</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">005773</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author>
<name sortKey="Fernandez, Marcel" sort="Fernandez, Marcel" uniqKey="Fernandez M" first="Marcel" last="Fernandez">Marcel Fernandez</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Cotrina, Josep" sort="Cotrina, Josep" uniqKey="Cotrina J" first="Josep" last="Cotrina">Josep Cotrina</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Soriano, Miguel" sort="Soriano, Miguel" uniqKey="Soriano M" first="Miguel" last="Soriano">Miguel Soriano</name>
<affiliation>
<mods:affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Domingo, Neus" sort="Domingo, Neus" uniqKey="Domingo N" first="Neus" last="Domingo">Neus Domingo</name>
<affiliation>
<mods:affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">079E810651163439484C957B9342E895E57AB0FB</idno>
<idno type="DOI">10.1007/978-3-540-76788-6_20</idno>
<idno type="ChapterID">20</idno>
<idno type="ChapterID">Chap20</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C  ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Marcel Fernandez</name>
<affiliations>
<json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josep Cotrina</name>
<affiliations>
<json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item>
<name>Miguel Soriano</name>
<affiliations>
<json:string>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</json:string>
<json:string>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</json:string>
</affiliations>
</json:item>
<json:item>
<name>Neus Domingo</name>
<affiliations>
<json:string>I.E.S. J.V Foix, Rubi. Barcelona, Spain</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 > n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C  ≤ c(n − d), such that any linear code is c-TA if c > n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</abstract>
<qualityIndicators>
<score>5.97</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>493</abstractCharCount>
<pdfWordCount>3402</pdfWordCount>
<pdfCharCount>15669</pdfCharCount>
<pdfPageCount>8</pdfPageCount>
<abstractWordCount>89</abstractWordCount>
</qualityIndicators>
<title>A Note About the Traceability Properties of Linear Codes</title>
<chapterId>
<json:string>20</json:string>
<json:string>Chap20</json:string>
</chapterId>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2007</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Kil-Hyun Nam</name>
</json:item>
<json:item>
<name>Gwangsoo Rhee</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Discrete Mathematics in Computer Science</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-76787-9</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Information Security and Cryptology - ICISC 2007</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-540-76788-6</json:string>
</bookId>
<volume>4817</volume>
<pages>
<last>258</last>
<first>251</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-76788-6</json:string>
</eisbn>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-76788-6</json:string>
</doi>
</host>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-76788-6_20</json:string>
</doi>
<id>079E810651163439484C957B9342E895E57AB0FB</id>
<score>1</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2007</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">A Note About the Traceability Properties of Linear Codes</title>
<author>
<persName>
<forename type="first">Marcel</forename>
<surname>Fernandez</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
</author>
<author>
<persName>
<forename type="first">Josep</forename>
<surname>Cotrina</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
</author>
<author>
<persName>
<forename type="first">Miguel</forename>
<surname>Soriano</surname>
</persName>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</affiliation>
</author>
<author>
<persName>
<forename type="first">Neus</forename>
<surname>Domingo</surname>
</persName>
<affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Information Security and Cryptology - ICISC 2007</title>
<title level="m" type="sub">10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</title>
<idno type="pISBN">978-3-540-76787-9</idno>
<idno type="eISBN">978-3-540-76788-6</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-76788-6</idno>
<idno type="BookID">978-3-540-76788-6</idno>
<idno type="BookTitleID">158070</idno>
<idno type="BookSequenceNumber">4817</idno>
<idno type="BookVolumeNumber">4817</idno>
<idno type="BookChapterCount">28</idno>
<editor>
<persName>
<forename type="first">Kil-Hyun</forename>
<surname>Nam</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gwangsoo</forename>
<surname>Rhee</surname>
</persName>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2007"></date>
<biblScope unit="volume">4817</biblScope>
<biblScope unit="page" from="251">251</biblScope>
<biblScope unit="page" to="258">258</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2007</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">079E810651163439484C957B9342E895E57AB0FB</idno>
<idno type="DOI">10.1007/978-3-540-76788-6_20</idno>
<idno type="ChapterID">20</idno>
<idno type="ChapterID">Chap20</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2007</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C  ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I15033</label>
<label>I17028</label>
<label>I14050</label>
<label>I24067</label>
<label>I16021</label>
<label>I13022</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Discrete Mathematics in Computer Science</term>
</item>
<item>
<term>Systems and Data Security</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
<item>
<term>Algorithm Analysis and Problem Complexity</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2007">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-19">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/079E810651163439484C957B9342E895E57AB0FB/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-76788-6</BookID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
<BookSubTitle>10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4817</BookVolumeNumber>
<BookSequenceNumber>4817</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-76788-6</BookDOI>
<BookTitleID>158070</BookTitleID>
<BookPrintISBN>978-3-540-76787-9</BookPrintISBN>
<BookElectronicISBN>978-3-540-76788-6</BookElectronicISBN>
<BookChapterCount>28</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I15033" Priority="1" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I17028" Priority="2" Type="Secondary">Discrete Mathematics in Computer Science</BookSubject>
<BookSubject Code="I14050" Priority="3" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="I24067" Priority="4" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I16021" Priority="5" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I13022" Priority="6" Type="Secondary">Computer Communication Networks</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Kil-Hyun</GivenName>
<FamilyName>Nam</FamilyName>
</EditorName>
<Contact>
<Email>khnam@kndu.ac.kr</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gwangsoo</GivenName>
<FamilyName>Rhee</FamilyName>
</EditorName>
<Contact>
<Email>rhee@sookmyung.ac.kr</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part3">
<PartInfo TocLevels="0">
<PartID>3</PartID>
<PartSequenceNumber>3</PartSequenceNumber>
<PartTitle>Hash Functions – I</PartTitle>
<PartChapterCount>9</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
</PartContext>
</PartInfo>
<SubPart ID="SubPart6">
<SubPartInfo>
<SubPartID>6</SubPartID>
<SubPartSequenceNumber>6</SubPartSequenceNumber>
<SubPartTitle>Copyright Protection</SubPartTitle>
<SubPartChapterCount>1</SubPartChapterCount>
</SubPartInfo>
<Chapter ID="Chap20" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>20</ChapterID>
<ChapterDOI>10.1007/978-3-540-76788-6_20</ChapterDOI>
<ChapterSequenceNumber>20</ChapterSequenceNumber>
<ChapterTitle Language="En">A Note About the Traceability Properties of Linear Codes</ChapterTitle>
<ChapterFirstPage>251</ChapterFirstPage>
<ChapterLastPage>258</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>3</PartID>
<BookID>978-3-540-76788-6</BookID>
<BookTitle>Information Security and Cryptology - ICISC 2007</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Marcel</GivenName>
<FamilyName>Fernandez</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Josep</GivenName>
<FamilyName>Cotrina</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff1 Aff2">
<AuthorName DisplayOrder="Western">
<GivenName>Miguel</GivenName>
<FamilyName>Soriano</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff3">
<AuthorName DisplayOrder="Western">
<GivenName>Neus</GivenName>
<FamilyName>Domingo</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff1">
<OrgName>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona</OrgName>
<OrgAddress>
<Country>Spain</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona</OrgName>
<OrgAddress>
<Country>Spain</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>I.E.S. J.V Foix, Rubi. Barcelona</OrgName>
<OrgAddress>
<Country>Spain</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>We characterize the traceability properties of linear codes. It is well known that any code of length
<Emphasis Type="Italic">n</Emphasis>
and minimum distance
<Emphasis Type="Italic">d</Emphasis>
is a
<Emphasis Type="Italic">c</Emphasis>
-TA code if
<Emphasis Type="Italic">c</Emphasis>
<Superscript>2</Superscript>
 < 
<Emphasis Type="Italic">n</Emphasis>
/(
<Emphasis Type="Italic">n</Emphasis>
 − 
<Emphasis Type="Italic">d</Emphasis>
). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value
<Emphasis Type="Italic">Z</Emphasis>
<Subscript>
<Emphasis Type="Italic">C</Emphasis>
</Subscript>
, with
<Emphasis Type="Italic">n</Emphasis>
 − 
<Emphasis Type="Italic">d</Emphasis>
 ≤ 
<Emphasis Type="Italic">Z</Emphasis>
<Subscript>
<Emphasis Type="Italic">C</Emphasis>
</Subscript>
 ≤ 
<Emphasis Type="Italic">c</Emphasis>
(
<Emphasis Type="Italic">n</Emphasis>
 − 
<Emphasis Type="Italic">d</Emphasis>
), such that any linear code is
<Emphasis Type="Italic">c</Emphasis>
-TA if
<Emphasis Type="Italic">c</Emphasis>
 < 
<Emphasis Type="Italic">n</Emphasis>
/
<Emphasis Type="Italic">Z</Emphasis>
<Subscript>
<Emphasis Type="Italic">C</Emphasis>
</Subscript>
. We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</SubPart>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>A Note About the Traceability Properties of Linear Codes</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>A Note About the Traceability Properties of Linear Codes</title>
</titleInfo>
<name type="personal">
<namePart type="given">Marcel</namePart>
<namePart type="family">Fernandez</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josep</namePart>
<namePart type="family">Cotrina</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Miguel</namePart>
<namePart type="family">Soriano</namePart>
<affiliation>Technical University of Catalonia, Department of Telematic Engineering, C/Jordi Girona 1-3, C3 08034, Barcelona, Spain</affiliation>
<affiliation>CTTC. Centre Tecnolgic de Telecomunicacions de Catalunya, Av. Canal Olímpic S/N 08860 - Castelldefels. Barcelona, Spain</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Neus</namePart>
<namePart type="family">Domingo</namePart>
<affiliation>I.E.S. J.V Foix, Rubi. Barcelona, Spain</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2 < n/(n − d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n − d ≤ Z C  ≤ c(n − d), such that any linear code is c-TA if c < n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Information Security and Cryptology - ICISC 2007</title>
<subTitle>10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Kil-Hyun</namePart>
<namePart type="family">Nam</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gwangsoo</namePart>
<namePart type="family">Rhee</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I17028">Discrete Mathematics in Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-76788-6</identifier>
<identifier type="ISBN">978-3-540-76787-9</identifier>
<identifier type="eISBN">978-3-540-76788-6</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">158070</identifier>
<identifier type="BookID">978-3-540-76788-6</identifier>
<identifier type="BookChapterCount">28</identifier>
<identifier type="BookVolumeNumber">4817</identifier>
<identifier type="BookSequenceNumber">4817</identifier>
<identifier type="PartChapterCount">9</identifier>
<part>
<date>2007</date>
<detail type="part">
<title>Hash Functions – I</title>
</detail>
<detail type="volume">
<number>4817</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>251</start>
<end>258</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">079E810651163439484C957B9342E895E57AB0FB</identifier>
<identifier type="DOI">10.1007/978-3-540-76788-6_20</identifier>
<identifier type="ChapterID">20</identifier>
<identifier type="ChapterID">Chap20</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 005773 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 005773 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:079E810651163439484C957B9342E895E57AB0FB
   |texte=   A Note About the Traceability Properties of Linear Codes
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024