The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the theory and Applications of Cryptology and information Security, ASIACRYPT 2017,&...
详细信息
ISBN:
(数字)9783319707006
ISBN:
(纸本)9783319706993
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the theory and Applications of Cryptology and information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.;The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th Workshop on theory of Quantum Computation, Communication, and Cryptography, TQC 2009, held in Waterloo, Canada, in May 2009. The 10 re...
详细信息
ISBN:
(数字)9783642106989
ISBN:
(纸本)9783642106972
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th Workshop on theory of Quantum Computation, Communication, and Cryptography, TQC 2009, held in Waterloo, Canada, in May 2009. The 10 revised papers presented were carefully selected during two rounds of reviewing and improvement. The papers present current original research and focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are part of a larger interdisciplinary field embedding information science in a quantum mechanical framework. Topics addressed are such as quantum algorithms, models of quantum computation, quantum complexity theory, simulation of quantum systems, quantum cryptography, quantum communication, quantum estimation and measurement, quantum noise, quantum codingtheory, fault-tolerant quantum computing, and entanglement theory.
It is commonly assumed that computers process information. But what is inf- mation? In a technical, important, but nevertheless rather narrow sense, Sh- non’sinformationtheorygivesa?*** on measuring the information c...
详细信息
ISBN:
(数字)9783642006593
ISBN:
(纸本)9783642006586
It is commonly assumed that computers process information. But what is inf- mation? In a technical, important, but nevertheless rather narrow sense, Sh- non’sinformationtheorygivesa?*** on measuring the information content of a message. Essentially this measure is the reduction of the uncertainty obtained by receiving a message. The unc- tainty of a situation of ignorance in turn is measured by entropy. This theory hashad an immense impact on the technologyof information storage,data c- pression, information transmission and coding and still is a very active domain of research. Shannon’s theory has also attractedmuch interest in a more philosophic look at information, although it was readily remarked that it is only a “syntactic” theory of information and neglects “semantic” issues. Several attempts have been made in philosophy to give informationtheory a semantic ?avor, but still mostly based on or at least linked to Shannon’s theory. Approaches to semantic ***,information is linked to reasoning, deduction and inference, as well as to decision making. Further, entropy and related measure were soon found to have important connotations with regard to statistical inference. Surely, statistical data and observation represent information, information about unknown, hidden para- ters. Thus a whole branch of statistics developed around concepts of Shannon’s informationtheory or derived from them. Also some proper measurements - propriate for statistics, like Fisher’s information, were proposed.
This book constitutes the refereed proceedings of the 13th International Conference on information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presente...
详细信息
ISBN:
(数字)9783642252433
ISBN:
(纸本)9783642252426
This book constitutes the refereed proceedings of the 13th International Conference on information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
Diese Einführung in die Grundlagen der Dokumentation und des Wiederauffindens von information zu thematisch-inhaltlichen Fragen entstand auf der Basis langjähriger Lehrtätigkeit. Die theoretisch fundier...
详细信息
ISBN:
(数字)9783662067611
Diese Einführung in die Grundlagen der Dokumentation und des Wiederauffindens von information zu thematisch-inhaltlichen Fragen entstand auf der Basis langjähriger Lehrtätigkeit. Die theoretisch fundierte wie praxisorientierte Darstellung der Literatur-, Daten- und Faktendokumentation enthält neben zahlreichen Übungen einen Beispiel-Thesaurus, die Besprechung realer Ordnungs- und Retrievalsysteme sowie ca. 200 Prüfungsfragen mit den dazugehörigen Antworten. Das Buch ist von zentraler Bedeutung für die Ausbildung von Dokumentaren, Bibliothekaren und Archivaren. Durch sein ausführliches Sachwortregister eignet es sich auch als Nachschlagewerk.;Die vorliegende, völlig neu bearbeitete zweite Auflage, berücksichtigt zusätzlich den Wechsel von manuellen Speichertechniken zu Retrieval-Programmen auf dem PC.
暂无评论