Download Error Control, Cryptology, and Speech Compression: Workshop by V. A. Artamonov, A. A. Klyachko (auth.), Andrew Chmora, PDF

By V. A. Artamonov, A. A. Klyachko (auth.), Andrew Chmora, Stephen B. Wicker (eds.)

This quantity contains a set of papers awarded on the Workshop on info safety, held in Moscow, Russia in December 1993. The sixteen completely refereed papers via the world over recognized scientists chosen for this quantity supply a thrilling standpoint on mistakes keep an eye on coding, cryptology, and speech compression. within the former Soviet Union, examine concerning info security used to be usually protected from the overseas medical group. consequently, the implications offered by means of Russian researchers and engineers at this primary foreign workshop in this subject are of specific curiosity; their paintings defines the leading edge of analysis in lots of parts of blunders keep an eye on, cryptology, and speech recognition.

Show description

Read or Download Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers PDF

Best international conferences and symposiums books

Advances in Databases and Information Systems: 12th East European Conference, ADBIS 2008, Pori, Finland, September 5-9, 2008, Proceedings (Lecture Notes ... Applications, incl. Internet/Web, and HCI)

This e-book constitutes the refereed complaints of the twelfth East eu convention on Advances in Databases and knowledge platforms, ADBIS 2008, held in Pori, Finland, on September 5-9, 2008. The 22 revised papers have been rigorously reviewed and chosen from sixty six submissions. Topically, the papers span a large spectrum of the database and data platforms box: from question optimization, and transaction processing through layout ways to software orientated issues like XML and information on the internet.

Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers

This quantity contains a set of papers offered on the Workshop on info defense, held in Moscow, Russia in December 1993. The sixteen completely refereed papers by way of across the world recognized scientists chosen for this quantity supply an exhilarating standpoint on blunders regulate coding, cryptology, and speech compression.

Artificial Intelligence: Methodology, Systems, and Applications: 9th International Conference, AIMSA 2000 Varna, Bulgaria, September 20–23, 2000 Proceedings

This ebook constitutes the refereed complaints of the ninth overseas convention on synthetic Intelligence: method, structures, and purposes, AIMSA 2000, held in Varna, Bulgaria in September 2000. The 34 revised complete papers provided have been conscientiously reviewed and chosen from 60 submissions. The papers are prepared in topical sections on wisdom building, reasoning below sure bet, reasoning lower than uncertainty, actors and brokers, internet mining, average language processing, complexity and optimization, fuzzy and neural structures, and algorithmic studying.

Additional resources for Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers

Example text

3 Integrating SMC with Agents Mobile agent applications have brought a practical relevance to development of secure, efficient cryptographic protocol schemes. The goal of SMC has been stated as guaranteeing the correctness of a function and the privacy of results among the parties. In mobile code systems, similar notions exist: malicious hosts can spy on the code, state, or results of mobile agents that they execute. There are two primary approaches to integrating SMC protocols with mobile agents: use single agents that implement single-round non-interactive protocols or use multiple agents that execute multi-round SMC protocols in coalition schemes.

However, the problem with this approach is that the server needs to be trusted unconditionally as it learns the user’s key. N. Modadugu, D. Boneh and M. Kim [2] resolved the problem by presenting server-aided RSA key generation protocols, which we call “MBK”. Using any of the MBK protocols, users can quickly generate an RSA key on a hand-held device with the help of untrusted servers in such a way that once the key is generated the server should not get any information about the key it helped generation.

Gong, ”An Improved Algorithm for Recursive Sums of Residue”, Journal of UEST (Chinese),29(1):1-4,2001 8. Harn, ”Public-key Cryptosystems Based on Cubic Finite Field Extension”, IEEE Transactions on Information Theory, 45(7):2601-2605, 1999 Hybrid Approach for Secure Mobile Agent Computations J. edu/∼ Abstract. Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures– benefiting greatly from schemes where cryptographic protocols are utilized.

Download PDF sample

Rated 4.42 of 5 – based on 15 votes