Advertisement

Alice and Bob

  • John Gordon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)

Abstract

Good evening Ladies and Gentlemen.

There comes a time when people at a technical conference like this need something more relaxing. A change of pace. A shift of style. To put aside all that work stuff and think of something refreshingly different.

So let’s talk about coding theory. There are perhaps some of you here tonight who are not experts in coding theory, but rather have been dragged here kicking and screaming. So I thought it would be a good idea if I gave you a sort of instant, five minute graduate course in coding theory.

Keywords

Phone Call Secret Message Security Protocol Electronic Mail Market Deal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • John Gordon
    • 1
  1. 1.University of Hertfordshire 

Personalised recommendations