Information Theoretic Security Based on Bounded Observability (Englisch)
- Neue Suche nach: Muramatsu, J.
- Neue Suche nach: Yoshimura, K.
- Neue Suche nach: Davis, P.
- Neue Suche nach: Muramatsu, J.
- Neue Suche nach: Yoshimura, K.
- Neue Suche nach: Davis, P.
- Neue Suche nach: Kurosawa, Kaoru
In:
Information Theoretic Security, ICITS 2009
5973
;
128-139
;
2010
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Information Theoretic Security Based on Bounded Observability
-
Beteiligte:
-
Kongress:Conference; 4th, Information Theoretic Security, ICITS 2009 ; 2009 ; Shizuoka, Canada
-
Erschienen in:Information Theoretic Security, ICITS 2009 , 5973 ; 128-139LECTURE NOTES IN COMPUTER SCIENCE , 5973 ; 128-139
-
Verlag:
- Neue Suche nach: Springer-Verlag
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:12 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Survey: Leakage Resilience and the Bounded Retrieval ModelAlwen, J. / Dodis, Y. / Wichs, D. et al. | 2010
- 19
-
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesDziembowski, S. et al. | 2010
- 27
-
Security of Key Distribution and Complementarity in Quantum MechanicsKoashi, M. et al. | 2010
- 28
-
Free-Start Distinguishing: Combining Two Types of Indistinguishability AmplificationGazi, P. / Maurer, U. et al. | 2010
- 45
-
Code-Based Public-Key Cryptosystems and Their ApplicationsKobara, K. et al. | 2010
- 56
-
On the Security of Pseudorandomized Information-Theoretically Secure SchemesNuida, K. / Hanaoka, G. et al. | 2010
- 74
-
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResiliencePatra, A. / Choudhary, A. / Rangan, C.P. et al. | 2010
- 93
-
On the Optimization of Bipartite Secret Sharing SchemesFarras, O. / Metcalf-Burton, J.R. / Padro, C. / Vazquez, L. et al. | 2010
- 110
-
Linear Threshold Multisecret Sharing SchemesFarras, O. / Gracia, I. / Martin, S. / Padro, C. et al. | 2010
- 127
-
Multiterminal Secrecy Generation and Tree PackingNarayan, P. et al. | 2010
- 128
-
Information Theoretic Security Based on Bounded ObservabilityMuramatsu, J. / Yoshimura, K. / Davis, P. et al. | 2010
- 140
-
Group Testing and Batch VerificationZaverucha, G.M. / Stinson, D.R. et al. | 2010
- 158
-
What Can Cryptography Do for Coding Theory?Smith, A. et al. | 2010
- 159
-
Cryptanalysis of Secure Message Transmission Protocols with FeedbackYang, Q. / Desmedt, Y. et al. | 2010
- 177
-
The Optimum Leakage Principle for Analyzing Multi-threaded ProgramsChen, H. / Malacaria, P. et al. | 2010
- 194
-
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit ErasureNuida, K. et al. | 2010
- 213
-
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint CodesNuida, K. / Hanaoka, G. et al. | 2010
- 231
-
Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum SpreadingSenda, K. / Kawamura, M. et al. | 2010