Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers /
ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunco...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
5973 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Leakage Resilient Cryptography
- Survey: Leakage Resilience and the Bounded Retrieval Model
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
- Quantum Cryptography and Indistinguishability
- Security of Key Distribution and Complementarity in Quantum Mechanics
- Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
- Connection to Computational Security
- Code-Based Public-Key Cryptosystems and Their Applications
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Secret Sharing
- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
- On the Optimization of Bipartite Secret Sharing Schemes
- Linear Threshold Multisecret Sharing Schemes
- Key Agreement from Common Randomness
- Multiterminal Secrecy Generation and Tree Packing
- Information Theoretic Security Based on Bounded Observability
- Random Graph and Group Testing
- Group Testing and Batch Verification
- Reliable Data Transmision and Computation
- What Can Cryptography Do for Coding Theory?
- Cryptanalysis of Secure Message Transmission Protocols with Feedback
- The Optimum Leakage Principle for Analyzing Multi-threaded Programs
- Fingerprint and Watermarking
- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
- An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes
- Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading.