Information Theoretic Security
Springer Berlin (Verlag)
978-3-540-85092-2 (ISBN)
Secure and Reliable Communication I.- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk).- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption.- Quantum Information and Communication.- Interactive Hashing: An Information Theoretic Tool (Invited Talk).- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network.- Networks and Devices.- Strong Secrecy for Wireless Channels (Invited Talk).- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).- Mulitparty Computation.- A Single Initialization Server for Multi-party Cryptography.- Statistical Security Conditions for Two-Party Secure Function Evaluation.- Information Hiding and Tracing.- Upper Bounds for Set Systems with the Identifiable Parent Property.- Coding Theory and Security.- Oblivious Transfer Based on the McEliece Assumptions.- List Error-Correction with Optimal Information Rate (Invited Talk).- Quantum Computation.- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk).- Susceptible Two-Party Quantum Computations.- Secure and Reliable Communication II.- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.- Key Refreshing in Wireless Sensor Networks.- Efficient Traitor Tracing from Collusion Secure Codes.- Foundation.- Revisiting the Karnin, Greene and Hellman Bounds.- Simple Direct Reduction of String (1,2)-OT to Rabin's OT without Privacy Amplification.- The Complexity of Distinguishing Distributions (Invited Talk).- Encryption.- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-CiphertextSecurity (Invited Talk).- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations.
Erscheint lt. Verlag | 22.7.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 249 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 405 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • broadcast encryption • coding theory • Communication • Complexity • Cryptanalysis • cryptographic protocols • cryptography • DES • deterministic randomness extractor • digital signature • DoS attacks • encryption schemes • Fingerprinting • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Hiding • Intrusion Detection • key predistribution • key refreshing • Multi-Party Computation • Network Security • oblivious transfer • pairings • pseudorandom functions • Quantum key distribution • quantum two-party protocols • Secret Sharing • secure function evaluation • security • security modeling • signature schemes • symmetric keys • Systems Security • threshold cryptography • traitor tracing • Watermarking • wireless sensor networks • Zero-knowledge |
ISBN-10 | 3-540-85092-9 / 3540850929 |
ISBN-13 | 978-3-540-85092-2 / 9783540850922 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich