By V. A. Artamonov, A. A. Klyachko (auth.), Andrew Chmora, Stephen B. Wicker (eds.)
This quantity contains a set of papers awarded on the Workshop on info safety, held in Moscow, Russia in December 1993. The sixteen completely refereed papers via the world over recognized scientists chosen for this quantity supply a thrilling standpoint on mistakes keep an eye on coding, cryptology, and speech compression. within the former Soviet Union, examine concerning info security used to be usually protected from the overseas medical group. consequently, the implications offered by means of Russian researchers and engineers at this primary foreign workshop in this subject are of specific curiosity; their paintings defines the leading edge of analysis in lots of parts of blunders keep an eye on, cryptology, and speech recognition.
Read or Download Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers PDF
Best international conferences and symposiums books
This e-book constitutes the refereed complaints of the twelfth East eu convention on Advances in Databases and knowledge platforms, ADBIS 2008, held in Pori, Finland, on September 5-9, 2008. The 22 revised papers have been rigorously reviewed and chosen from sixty six submissions. Topically, the papers span a large spectrum of the database and data platforms box: from question optimization, and transaction processing through layout ways to software orientated issues like XML and information on the internet.
This quantity contains a set of papers offered on the Workshop on info defense, held in Moscow, Russia in December 1993. The sixteen completely refereed papers by way of across the world recognized scientists chosen for this quantity supply an exhilarating standpoint on blunders regulate coding, cryptology, and speech compression.
This ebook constitutes the refereed complaints of the ninth overseas convention on synthetic Intelligence: method, structures, and purposes, AIMSA 2000, held in Varna, Bulgaria in September 2000. The 34 revised complete papers provided have been conscientiously reviewed and chosen from 60 submissions. The papers are prepared in topical sections on wisdom building, reasoning below sure bet, reasoning lower than uncertainty, actors and brokers, internet mining, average language processing, complexity and optimization, fuzzy and neural structures, and algorithmic studying.
- Information Security and Cryptology — ICISC 2002: 5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers
- Perspective in Image-Guided Surgery: Proceedings Of The Scientific Workshop On Medical Robotics, Navigation And Visualization : RheinAhrCampus Remagen, Germany 11 - 12 March
- Programming Multi-Agent Systems: First International Workshop, PROMAS 2003, Melbourne, Australia, July 15, 2003, Selected Revised and Invited papers
- Landmarks in Earth Reinforcement: Proceedings of the International Symposium on Earth Reinforcement, Fukuoka, Kyushi, Japan, 14-16 November 2001
- Intelligent Virtual Agents: 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005. Proceedings
Additional resources for Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers
3 Integrating SMC with Agents Mobile agent applications have brought a practical relevance to development of secure, eﬃcient cryptographic protocol schemes. The goal of SMC has been stated as guaranteeing the correctness of a function and the privacy of results among the parties. In mobile code systems, similar notions exist: malicious hosts can spy on the code, state, or results of mobile agents that they execute. There are two primary approaches to integrating SMC protocols with mobile agents: use single agents that implement single-round non-interactive protocols or use multiple agents that execute multi-round SMC protocols in coalition schemes.
However, the problem with this approach is that the server needs to be trusted unconditionally as it learns the user’s key. N. Modadugu, D. Boneh and M. Kim  resolved the problem by presenting server-aided RSA key generation protocols, which we call “MBK”. Using any of the MBK protocols, users can quickly generate an RSA key on a hand-held device with the help of untrusted servers in such a way that once the key is generated the server should not get any information about the key it helped generation.
Gong, ”An Improved Algorithm for Recursive Sums of Residue”, Journal of UEST (Chinese),29(1):1-4,2001 8. Harn, ”Public-key Cryptosystems Based on Cubic Finite Field Extension”, IEEE Transactions on Information Theory, 45(7):2601-2605, 1999 Hybrid Approach for Secure Mobile Agent Computations J. edu/∼ Abstract. Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures– beneﬁting greatly from schemes where cryptographic protocols are utilized.