IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, ICITS 2005, Awaji Island, Japan, October 16-19, 2005
ثبت نشده
چکیده
• The final report does not change from the intermediate one.
منابع مشابه
Bounds on authentication systems in query mode
Unconditionally secure authentication codes provide information theoretic security against an adversary who observes authenticated messages and then wants to construct a fraudulent message that is acceptable by the receiver. The attack model for these codes has recently been strengthened and adaptive adversaries with oracle access have been introduced. In this paper we give an analysis of this ...
متن کاملOn stationarity in Internet measurements PROC. IST IEEE WORKSHOP ON NETWORKING AND DATABASES, 2005 through an information-theoretic lens
Streaming change detection schemes are of great interest in the context of data warehouses, data cleaning systems, network traffic anomaly detection and other measurement scenarios. The goal of change detection systems is to determine whether fundamental characteristics of a data stream have changed, either temporally (with respect to prior data) or spatially (with respect to other streams). We...
متن کاملInformation-theoretic Cryptography
In 1949, Shannon published the paper ”Communication theory of secrecy systems”. This constituted a foundational treatment and analysis of encryption systems. He transferred the methods of information theory, originally developed as a mathematical model for communication over ”noisy” channels to the setting of cryptosystems. We give a brief introduction into his most outstanding ideas, such as t...
متن کاملSpecial Section on Information Theory and Its Applications
Shannon theory, Source coding, Data compression, Channel coding, Coding theory, Communication theory, Coding and modulation, Transmission technology, Wireless communications, Optical communications, Detection and estimation, Stochastic processes, Sequence design and analysis, Cryptography, Information-theoretic security, Information theory in networks, Network coding, Quantum information theory...
متن کاملDistributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution’s major limitations: the short maximum transmission distance (∼ 200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed ...
متن کامل