Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers /
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,also...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
5973 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Leakage Resilient Cryptography
- Survey: Leakage Resilience and the Bounded Retrieval Model
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
- Quantum Cryptography and Indistinguishability
- Security of Key Distribution and Complementarity in Quantum Mechanics
- Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
- Connection to Computational Security
- Code-Based Public-Key Cryptosystems and Their Applications
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Secret Sharing
- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
- On the Optimization of Bipartite Secret Sharing Schemes
- Linear Threshold Multisecret Sharing Schemes
- Key Agreement from Common Randomness
- Multiterminal Secrecy Generation and Tree Packing
- Information Theoretic Security Based on Bounded Observability
- Random Graph and Group Testing
- Group Testing and Batch Verification
- Reliable Data Transmision and Computation
- What Can Cryptography Do for Coding Theory?
- Cryptanalysis of Secure Message Transmission Protocols with Feedback
- The Optimum Leakage Principle for Analyzing Multi-threaded Programs
- Fingerprint and Watermarking
- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
- An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes
- Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading.