Deze website maakt gebruik van cookies. Klik hier voor meer informatie.X sluit
Uitgebreid zoeken

Information Theoretic Security

Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings

Information Theoretic Security - Safavi-naini, Reihaneh (EDT) - ISBN: 9783540850922
Prijs: € 68,80
Levertijd: 4 tot 6 werkdagen
Bindwijze: Boek
Genre: Computertechniek
Information Theoretic Security op
Add to cart


This Book Constitutes The Proceedings Of The Third International Conference On Information Theoretic Security, Held In Calgary, Canada, In August 2008. The Topics Covered Are Secure And Reliable Communication; Quantum Information And Communication; Information Hiding And Tracing; Coding Theory And Security; Quantum Computation;


Titel: Information Theoretic Security
auteur: Safavi-naini, Reihaneh (EDT)
Mediatype: Boek
Taal: Engels
Aantal pagina's: 249
Uitgever: Springer-verlag Berlin And Heidelberg Gmbh & Co. Kg
NUR: Computertechniek
Afmetingen: 235 x 155
Gewicht: 409 gr
ISBN/ISBN13: 9783540850922
Intern nummer: 11138929


Secure and Reliable Communication I.- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk).- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption.- Quantum Information and Communication.- Interactive Hashing: An Information Theoretic Tool (Invited Talk).- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network.- Networks and Devices.- Strong Secrecy for Wireless Channels (Invited Talk).- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).- Mulitparty Computation.- A Single Initialization Server for Multi-party Cryptography.- Statistical Security Conditions for Two-Party Secure Function Evaluation.- Information Hiding and Tracing.- Upper Bounds for Set Systems with the Identifiable Parent Property.- Coding Theory and Security.- Oblivious Transfer Based on the McEliece Assumptions.- List Error-Correction with Optimal Information Rate (Invited Talk).- Quantum Computation.- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk).- Susceptible Two-Party Quantum Computations.- Secure and Reliable Communication II.- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.- Key Refreshing in Wireless Sensor Networks.- Efficient Traitor Tracing from Collusion Secure Codes.- Foundation.- Revisiting the Karnin, Greene and Hellman Bounds.- Simple Direct Reduction of String (1,2)-OT to Rabin's OT without Privacy Amplification.- The Complexity of Distinguishing Distributions (Invited Talk).- Encryption.- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations.


Dit product is op dit moment niet op voorraad in een van onze vestigingen.