LEADER 06247nam 22008415 450 001 996465920403316 005 20200703235914.0 010 $a1-280-38803-X 010 $a9786613565952 010 $a3-642-14496-9 024 7 $a10.1007/978-3-642-14496-7 035 $a(CKB)2670000000045032 035 $a(SSID)ssj0000446550 035 $a(PQKBManifestationID)11312206 035 $a(PQKBTitleCode)TC0000446550 035 $a(PQKBWorkID)10496171 035 $a(PQKB)11373579 035 $a(DE-He213)978-3-642-14496-7 035 $a(MiAaPQ)EBC3065828 035 $a(PPN)14902455X 035 $a(EXLCZ)992670000000045032 100 $a20100910d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security$b[electronic resource] $e4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers /$fedited by Kaoru Kurosawa 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 249 p. 23 illus.) 225 1 $aSecurity and Cryptology ;$v5973 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14495-0 320 $aIncludes bibliographical references and index. 327 $aLeakage Resilient Cryptography -- Survey: Leakage Resilience and the Bounded Retrieval Model -- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes -- Quantum Cryptography and Indistinguishability -- Security of Key Distribution and Complementarity in Quantum Mechanics -- Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification -- Connection to Computational Security -- Code-Based Public-Key Cryptosystems and Their Applications -- On the Security of Pseudorandomized Information-Theoretically Secure Schemes -- Secret Sharing -- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience -- On the Optimization of Bipartite Secret Sharing Schemes -- Linear Threshold Multisecret Sharing Schemes -- Key Agreement from Common Randomness -- Multiterminal Secrecy Generation and Tree Packing -- Information Theoretic Security Based on Bounded Observability -- Random Graph and Group Testing -- Group Testing and Batch Verification -- Reliable Data Transmision and Computation -- What Can Cryptography Do for Coding Theory? -- Cryptanalysis of Secure Message Transmission Protocols with Feedback -- The Optimum Leakage Principle for Analyzing Multi-threaded Programs -- Fingerprint and Watermarking -- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure -- An Improvement of Pseudorandomization against Unbounded Attack Algorithms ? The Case of Fingerprint Codes -- Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading. 330 $aICITS2009washeldattheShizuokaConventionandArtsCenter?GRANSHIP? in Japan during December 3?6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security. 410 0$aSecurity and Cryptology ;$v5973 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aAlgorithms 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8/2 702 $aKurosawa$b Kaoru$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICITS 2009 906 $aBOOK 912 $a996465920403316 996 $aInformation Theoretic Security$9773803 997 $aUNISA LEADER 00698nam a22001813a 4500 001 991003892999707536 008 080918s 000 0 eng d 035 $ab13767677-39ule_inst 040 $aDip.to Lingue$bita 100 1 $aByron, George Gordon $0153241 245 14$aThe Poetical Works of Lord Byron /$cGeorge Gordon Byron 260 $aLondon :$bJohn Murray,$c1867 907 $a.b13767677$b28-01-14$c18-09-08 912 $a991003892999707536 945 $aLE012 Fondo Commonwealth 4-6-27$g1$i2012000307681$lle012$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14833165$z18-09-08 996 $aPoetical Works of Lord Byron$91227750 997 $aUNISALENTO 998 $ale012$b18-09-08$cm$da $e-$feng$guk $h4$i0 LEADER 00752nam a2200205 i 4500 001 991004367736807536 005 20250218140653.0 008 250218q191519 it er 001 i ita d 040 $aBibl. Dip.le Aggr. Scienze Giuridiche - Sez. Studi Giuridici$bita$cSocioculturale Scs 041 0 $aita 082 04$a940.41245$223 245 10$aLettere di soldati italiani /$craccolte da Lavinia Holl' ; con prefazione di Giovanni Bertacchi 260 $aTorino [etc.] :$bDitta G. B. Paravia e Comp., [dopo il 1915] 300 $a252 p. ;$c20 cm 650 4$aGuerra mondiale 1914-1918$zItalia$vLettere 700 1 $aHoll, Lavinia 700 1 $aBertacchi, Giovanni 912 $a991004367736807536 996 $aLettere di soldati italiani$94314692 997 $aUNISALENTO