IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, ICITS 2005, Awaji Island, Japan, October 16-19, 2005

ثبت نشده
چکیده

• The final report does not change from the intermediate one.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bounds on authentication systems in query mode

Unconditionally secure authentication codes provide information theoretic security against an adversary who observes authenticated messages and then wants to construct a fraudulent message that is acceptable by the receiver. The attack model for these codes has recently been strengthened and adaptive adversaries with oracle access have been introduced. In this paper we give an analysis of this ...

متن کامل

On stationarity in Internet measurements PROC. IST IEEE WORKSHOP ON NETWORKING AND DATABASES, 2005 through an information-theoretic lens

Streaming change detection schemes are of great interest in the context of data warehouses, data cleaning systems, network traffic anomaly detection and other measurement scenarios. The goal of change detection systems is to determine whether fundamental characteristics of a data stream have changed, either temporally (with respect to prior data) or spatially (with respect to other streams). We...

متن کامل

Information-theoretic Cryptography

In 1949, Shannon published the paper ”Communication theory of secrecy systems”. This constituted a foundational treatment and analysis of encryption systems. He transferred the methods of information theory, originally developed as a mathematical model for communication over ”noisy” channels to the setting of cryptosystems. We give a brief introduction into his most outstanding ideas, such as t...

متن کامل

Special Section on Information Theory and Its Applications

Shannon theory, Source coding, Data compression, Channel coding, Coding theory, Communication theory, Coding and modulation, Transmission technology, Wireless communications, Optical communications, Detection and estimation, Stochastic processes, Sequence design and analysis, Cryptography, Information-theoretic security, Information theory in networks, Network coding, Quantum information theory...

متن کامل

Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network

We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution’s major limitations: the short maximum transmission distance (∼ 200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005