The CCIS series is devoted to the publication of proceedings of computer science conferences. Its aim is to efficiently disseminate original research results in informatics in printed and electronic form. While the focus is on publication of peer-reviewed full papers presenting mature work, inclusion of reviewed short papers and abstracts reporting on work in progress is welcome, too. Besides globally relevant meetings with internationally representative program committees guaranteeing a strict peer-reviewing and paper selection process, conferences run by societies or of high regional or national relevance are considered for publication as well. The topical scope of CCIS spans the entire spectrum of informatics ranging from foundational topics in the theory of computing to information and communications science and technology and a broad variety of interdisciplinary application fields.Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes Saeed Ebadi Tavallaei and Abolfazl ... The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. ... Distribution, Error Control Codes (ECC), Public Key Cryptosystem (PKC), Public Key Infrastructure ( PKI), NP-complete problem. ... Then the corresponding usera#39;s private key, assuring with trusted third party named Key Generation Center (KGC) is S. Tenreiro deanbsp;...
|Title||:||Global Security, Safety, and Sustainability|
|Author||:||Sergio Tenreiro de Magalhaes, Hamid Jahankhani, Ali G. Hessami|
|Publisher||:||Springer Science & Business Media - 2010-08-19|