By Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)
This publication constitutes the refereed court cases of the second one overseas Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
The 21 revised complete technical papers, other than one, are contributed by means of the invited audio system of the workshop. The papers have been conscientiously chosen in the course of rounds of reviewing and development for inclusion within the quantity and tackle all points of coding thought, cryptology and comparable components - corresponding to combinatorics - theoretical or utilized. issues addressed are coding concept, safe codes, hash features, combinatorics, boolean features, authentication, cryptography, protocols, sequences, and safe communications.
Read Online or Download Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings PDF
Similar international conferences and symposiums books
This e-book constitutes the refereed lawsuits of the 1st overseas convention on electronic Human Modeling, DHM 2007, held in Beijing, China in July 2007 within the framework of the twelfth overseas convention on Human-Computer interplay, HCII 2007 with eight different thematically related meetings. The 118 revised papers awarded have been rigorously reviewed and chosen from a number of submissions.
This ebook constitutes the refereed court cases of the overseas convention on tendencies in digital trade, TREC'98, held in Hamburg, Germany, in June 1998. The ebook provides 19 revised complete papers chosen from a complete of seventy five submissions. whereas focussing generally on technological concerns, the e-book additionally takes under consideration vital social, administrative, regulatory, and felony features.
This e-book constitutes the refereed lawsuits of the tenth foreign convention on Simulation of Adaptive habit, SAB 2008, held in Osaka, Japan in July 2008. The 30 revised complete papers and 21 revised poster papers provided have been conscientiously reviewed and chosen from one hundred ten submissions. The papers are geared up in topical sections at the animat method of adaptive behaviour, evolution, navigation and inner international types, conception and keep watch over, studying and variation, cognition, emotion and behavior, collective and social behaviours, adaptive behaviour in language and verbal exchange, and utilized adaptive behaviour.
This ebook constitutes the refereed lawsuits of the 18th foreign convention on structure of Computing structures, ARCS 2005, held in Innsbruck, Austria in March 2005. The 18 revised complete papers offered have been rigorously reviewed and chosen from fifty two submissions. The papers are geared up in topical sections on edition, strength intake, and scheduling; variation and brokers; model and providers; software of adaptable platforms; and pervasive computing and verbal exchange.
- Next Generation Information Technologies and Systems: 4th International Workshop, NGITS’99 Zikhron-Yaakov, Israel, July 5–7, 1999 Proceedings
- Functional Imaging and Modeling of the Heart: 4th International Conference, FIHM 2007, Salt Lake City, UT, USA, June 7-9, 2007. Proceedings
- Parallel Computing Technologies: 8th International Conference, PaCT 2005, Krasnoyarsk, Russia, September 5-9, 2005. Proceedings
- The Big Fish Bang (Proceedings of the 26th annual Larval Fish Conference)
- Geometric Modeling and Processing - GMP 2006: 4th International Conference, Pittsburgh, PA, USA, July 26-28, 2006. Proceedings
Extra info for Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings
Ensembles of binary equal-weight codes are considered along with a new eﬃcient decoding algorithm. The design substantially increases the code rates of the former ﬁngerprinting constructions. In particular, for large t, the new tﬁngerprinting codes have code rate of t−2 ln 2 and identify a pirate with an error probability that declines exponentially in code length n. 1 Introduction To protect the copyrights, a distributor of digital content marks each copy of data with a unique digital fingerprint.
Randomized ﬁngerprinting codes designed under marking assumption were pioneered by Boneh and Shaw . The zero-error case ε = 0 was considered in  - . This setting gives the codes with the identifiable parent property. Long ﬁngerprinting codes with a non-vanishing code rate were designed in . An important breakthrough was obtained by Tardos  who designed t -ﬁngerprinting codes of rate Rt ≥ c/t2 , where c = 1/100. In addition, the decoding of  has a low complexity of order M. Using , constant c was later reﬁned in  to about 1/(4π 2 ).
Journal of Combinatorial Designs 1, 51–63 (1993) 17. : Iterative exhaustive pattern generation for logic testing. IBM Journal Research and Development 28(2), 212–219 (1984) 18. : Private communication by e-mail (March 2008) 19. : Upper bounds for covering arrays by tabu search. Discrete Applied Mathematics 138(9), 143–152 (2004) 20. : A backtracking search tool for constructing combinatorial test suites. J. Colbourn and G. K´eri 21. : Constraint models for the covering test problem. Constraints 11, 199–219 (2006) 22.
Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings by Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)