找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Theoretic Security; Third International Reihaneh Safavi-Naini Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20

[復(fù)制鏈接]
樓主: interleukins
31#
發(fā)表于 2025-3-26 23:53:28 | 只看該作者
Key Refreshing in Wireless Sensor Networksovide forward security. We discuss several applications that lead to sensor networks with very different properties, and we propose key refreshing schemes that are useful in each of these environments, together with resynchronisation methods that allow nodes possessing different versions of a key to arrive at a common version.
32#
發(fā)表于 2025-3-27 01:46:49 | 只看該作者
33#
發(fā)表于 2025-3-27 07:00:12 | 只看該作者
0302-9743 onference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.978-3-540-85092-2978-3-540-85093-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
34#
發(fā)表于 2025-3-27 10:04:58 | 只看該作者
0302-9743 ugust 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computati
35#
發(fā)表于 2025-3-27 13:43:35 | 只看該作者
Susceptible Two-Party Quantum Computations protocol completes, is at most 1???.(.), for some function . of?.. Thus, this model allows to measure the trade-off between the advantage of a dishonest party and the error induced by its attack. Furthermore, we present a protocol for computing the one-out-of-two oblivious transfer function that achieves a quadratic trade-off i.e. .?=?.(..).
36#
發(fā)表于 2025-3-27 19:09:40 | 只看該作者
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited d coordinated ways) by a computationally unbounded adversary. It is well known that some fundamental tasks in information-theoretic security, such as secure communication (perfectly secure message transmission)?[4], broadcast (a.k.a. Byzantine agreement)?[7], and secure multi-party computation?[1,2]
37#
發(fā)表于 2025-3-27 23:34:26 | 只看該作者
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryptioner . and a receiver ., and they do not share any information like keys. . wants to send a message to . secretly and reliably in .-round. But, there is an adversary . who can observe and forge at most . information which sent through .-channels..In this paper, we propose almost secure (1-round, 3.+1
38#
發(fā)表于 2025-3-28 03:15:54 | 只看該作者
Interactive Hashing: An Information Theoretic Tool (Invited Talk)in the bounded memory model. In Interactive Hashing, a sender transfers a bit string to a receiver such that two strings are received, the original string and a second string that appears to be chosen at random among those distinct from the first..This paper starts by formalizing the notion of Inter
39#
發(fā)表于 2025-3-28 10:00:15 | 只看該作者
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromisetions: the short maximum transmission distance (~200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed compromised nodes. The protocol provides arbitrarily h
40#
發(fā)表于 2025-3-28 11:00:08 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-24 00:02
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
祥云县| 达日县| 青海省| 灵璧县| 鄂州市| 大化| 福清市| 屯门区| 元朗区| 胶州市| 拜泉县| 台中市| 江西省| 岳阳县| 合江县| 抚松县| 祁阳县| 富顺县| 莆田市| 博野县| 澎湖县| 汉川市| 隆化县| 桃江县| 遂溪县| 巫溪县| 永德县| 尚义县| 延安市| 安岳县| 酉阳| 晋宁县| 广州市| 菏泽市| 呈贡县| 青州市| 山东省| 于都县| 噶尔县| 三门峡市| 湖口县|