Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers /

ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunco...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kurosawa, Kaoru (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 5973
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Leakage Resilient Cryptography
  • Survey: Leakage Resilience and the Bounded Retrieval Model
  • A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
  • Quantum Cryptography and Indistinguishability
  • Security of Key Distribution and Complementarity in Quantum Mechanics
  • Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
  • Connection to Computational Security
  • Code-Based Public-Key Cryptosystems and Their Applications
  • On the Security of Pseudorandomized Information-Theoretically Secure Schemes
  • Secret Sharing
  • Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
  • On the Optimization of Bipartite Secret Sharing Schemes
  • Linear Threshold Multisecret Sharing Schemes
  • Key Agreement from Common Randomness
  • Multiterminal Secrecy Generation and Tree Packing
  • Information Theoretic Security Based on Bounded Observability
  • Random Graph and Group Testing
  • Group Testing and Batch Verification
  • Reliable Data Transmision and Computation
  • What Can Cryptography Do for Coding Theory?
  • Cryptanalysis of Secure Message Transmission Protocols with Feedback
  • The Optimum Leakage Principle for Analyzing Multi-threaded Programs
  • Fingerprint and Watermarking
  • A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
  • An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes
  • Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading.