Search ISIT 2010

Technical Program

Q-Tu-4: Codes for Security

Time: Tuesday, June 15, 16:20 - 18:00
Location: Salon D
Session Chair: Salim El Rouayheb, University of California, Berkeley
 
Q-Tu-4.1: USING CODING TECHNIQUES TO ANALYZE WEAK FEEDBACK POLYNOMIALS
         Martin Hell; Lund University
 
Q-Tu-4.2: TWO-LEVEL FINGERPRINTING: STRONGER DEFINITIONS AND CODE CONSTRUCTIONS
         N. Prasanth Anthapadmanabhan; University of Texas at Austin
         Alexander Barg; University of Maryland and IPPI RAS
 
Q-Tu-4.3: SECURITY EMBEDDING CODES
         Hung Ly; Texas A&M University
         Tie Liu; Texas A&M University
         Yufei Blankenship; Huawei Technologies
 
Q-Tu-4.4: CONSTRUCTION OF WIRETAP CODES FROM ORDINARY CHANNEL CODES
         Masahito Hayashi; Tohoku University
         Ryutaroh Matsumoto; Tokyo Institute of Technology
 
Q-Tu-4.5: ON SECURE DISTRIBUTED DATA STORAGE UNDER REPAIR DYNAMICS
         Sameer Pawar; University of California, Berkeley
         Salim El Rouayheb; University of California, Berkeley
         Kannan Ramchandran; University of California, Berkeley
 

IEEE Valid HTML! Except for images and photographs, content on
this site is licensed under a Creative Commons
GNU General Public License, version 3.