Questions De Sécurité Et De Vie Privée Autour Des Protocoles D'identification De Personnes Et D'objets

Total Page:16

File Type:pdf, Size:1020Kb

Questions De Sécurité Et De Vie Privée Autour Des Protocoles D'identification De Personnes Et D'objets Questions de Sécurité et de Vie Privée autour des Protocoles d’Identification de Personnes et d’Objets Bruno Kindarji To cite this version: Bruno Kindarji. Questions de Sécurité et de Vie Privée autour des Protocoles d’Identification de Personnes et d’Objets. domain_other. Télécom ParisTech, 2010. Français. pastel-00006233 HAL Id: pastel-00006233 https://pastel.archives-ouvertes.fr/pastel-00006233 Submitted on 8 Jul 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. i ii Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety. - - Benjamin Franklin Foreword The context. Identification of people, devices, or patterns is a very broad subject, on which many research efforts are being deployed. By identification, we mean auto- matic identification by means of algorithms, protocols, making use of sensors and computers. In other words, the identification is a procedure in which the subject who needs to be identified does not directly provide its identity. This definition, intently vague and general, can be applied to many real-life situa- tions. For example, a night guard at a military facility can recognize the high ranking officers who are granted access to the building. However, should there be a high turnover of either the officers or the night guards, then this security measure becomes inefficient. The officer now needs to present an identifying element in order to gain access. This is the classical step to switch from a situation where the security is based on who I am to a situation where what matters is either what I know or what I have. The advantage of the first choice is that there is no need to carry a burdening equipment to enter; however, (classical) knowledge is transmittable, while a well thought design can make reproducibility of security elements hard or impossible. About Biometrics and Privacy The first research axis of this manuscript is to revert to what is commonly called the third factor (what we are) even though we saw that this is actually the first factor. The global research effort on automatic identification is justified by the need to make a safer use of a whole range of technologies that were invented these last decades. From physical threats against strategic targets, to privacy risks when using a specific virtual service, the range of real-life menaces to take into account is wide. While the protection against physical violence is mostly oriented towards the verification of everyone’s identity, it also requires everyone to disclose as much information as possible. However, more disclosure also means less privacy. iii iv Privacy is the ability of an individual to seclude information about himself from the incursions of the others [188]. Defining this property is not an easy task for scientists; however some attempts were made in this direction. Once this was done, achieving privacy, while ensuring the maximal security and the minimal annoyance for the user, is a major scientific challenge. The solution that we naturally considered for this purpose is the use of biometrics as a means of identification. Biometrics are fascinating elements of identification embedded in the human body; using them properly can lead to impressive levels of precision and accuracy. However, adding biometrics to the privacy equation raises even more challenges, as these identifying elements lead to identity theft, or more simply, disclosure of someone’s habits. To prevent these risks, few solutions existed at the beginning of this thesis. A large part of this work consists in studying the implications of using biometrics in security protocol. In particular, the storage and transmission of biometric templates must be handled with specific precautions. Existing Solutions for Template Protection We consider in this work that it is possible for the transmission of biometric templates to be made as se- cure as any transmission, as long as the adequate cryptographic infrastructure is chosen. The first part of this document studies the state-of-the-art solutions for template storage, which is the Achilles’ heel of biometric systems. In par- ticular, solutions such as Secure Sketches [27, 28] and Cancelable Biometrics [31, 32] are considered, in order to evaluate how good the associated algo- rithms behave on real-life data, and also how strong the underlying security is. We explicitly exhibit limitations that are inherent to these methods. Propositions for Secure Biometric Identification In the second part of this document, we propose new methods for using biometrics in a secure setting, and more specifically, in the context of biometric identification. We propose a new cryptographic primitive, called Error-Tolerant Searchable En- cryption [33], which is a generalization of Searchable Encryption. The appli- cation of Error-Tolerant Searchable Encryption to biometric data can lead to protocols that enable (secure-) biometric identification [34]. This aforementioned primitive was designed in the spirit of public-key cryptography. However, in order to preserve as much privacy as possible, the cryptographic requirements that were raised led to expensive computation on the database. In particular, the cryptographic operations that need to be done must be linear in the number of enrolled people; if this number is about the size of a national population, the computations are already too costly to be practical. Another line of work to solve this issue consists in applying symmetric cryptography, and different data structures for the storage [2]. The security properties that can be derived are different, and somewhat v less protective. Nevertheless, the efficiency of this scheme is much greater, which makes that scheme interesting to consider. Finally, we show how it is possible to investigate different strategies for biometrics by changing models. One example is to apply time-dependent functions to biometric templates [32]; if the function family is well chosen, then this can lead to an interesting application that we call Anonymous Iden- tification. Another example is to dedicate biometric hardware to improve the accuracy of a biometric system; with a specific Match-on-Card technology, we are able to deploy a secure identification scheme that requires limited crypto- graphic requirements, and proves to be very efficient [30]. Solutions for Wireless Communication and Device Identification The second research axis that motivated our study was the enforcement of privacy while being in a secure setting. Modern cryptography’s characteristic is to provide computing primitives that enable people to transmit information in a secure way, and this can be both for military and civilian purposes. This thesis makes explicit several situations where security and privacy are desirable, and sometimes achievable. The link with identification will be made clear at that time. Minimal-cost Identification Protocols Setting aside the noisy character of biometrics, one can ask the question of the overall complexity of identifi- cation protocols. In the case of noisy data, the overall performance can be expressed by the amount of data that did not perform well. With exact data, we can focus on the communication cost of identification protocols. We stud- ied the costs of identification protocols [48], and most especially the League Problem: how many bits must me transmitted from one partner to the other, when there is prior – but non-shared – information on the data. We then showed that it is possible to outperform the optimal solutions if we allow a small error-probability. This involves several techniques, such as deploying Identification Codes, a barely known though interesting coding primitive. Private Interrogation of Devices Finally, identification codes can be used in a very different way, in order to beckon an element from a set of low-cost wireless devices. Indeed, there are situations in real-life where the question is not “who is in front of me?”, but rather “Is Alice somewhere in the neighbourhood?”. For that purpose, we deploy some identification codes, and we also state the cryptographic conditions for the privacy of these elements[35]. Here, the security rests on the unique ability of a wireless sensor to know the identity of the element interrogated; we show that a construction using coding theory over finite fields can be simple yet efficient. vi In order to evaluate the security of that scheme, we use a common com- putational assumption, known as the Polynomial Reconstruction Problem. In order to test further the strength of this assumption in this context, we go further and look for the decoding possibility of Maximum-Distance Separable codes – such as Reed-Solomon codes. That lead us to the study of the thresh- old of these codes, closely related to their list-decoding capacity. After showing that the behaviour of q-ary codes around their threshold is the same as binary codes, we show how to explicitly estimate the threshold, asymptotically and for codes of finite yet reasonable length. Overview This work investigates several means for achieving identification. Authenti- cation is usually preferred to identification because the paradigm is easier to accomplish; however, we discovered during the course of research that there can be efficient ways to deal with the difficulties of identification. The main issue that is still to be improved is the error rate that is likely to arise as soon as probabilistic methods are used, be it for biometric applications, or for exact data that use probabilistic algorithms.
Recommended publications
  • Information Theory and Statistics: a Tutorial
    Foundations and Trends™ in Communications and Information Theory Volume 1 Issue 4, 2004 Editorial Board Editor-in-Chief: Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544, USA [email protected] Editors Venkat Anantharam (Berkeley) Amos Lapidoth (ETH Zurich) Ezio Biglieri (Torino) Bob McEliece (Caltech) Giuseppe Caire (Eurecom) Neri Merhav (Technion) Roger Cheng (Hong Kong) David Neuhoff (Michigan) K.C. Chen (Taipei) Alon Orlitsky (San Diego) Daniel Costello (NotreDame) Vincent Poor (Princeton) Thomas Cover (Stanford) Kannan Ramchandran (Berkeley) Anthony Ephremides (Maryland) Bixio Rimoldi (EPFL) Andrea Goldsmith (Stanford) Shlomo Shamai (Technion) Dave Forney (MIT) Amin Shokrollahi (EPFL) Georgios Giannakis (Minnesota) Gadiel Seroussi (HP-Palo Alto) Joachim Hagenauer (Munich) Wojciech Szpankowski (Purdue) Te Sun Han (Tokyo) Vahid Tarokh (Harvard) Babak Hassibi (Caltech) David Tse (Berkeley) Michael Honig (Northwestern) Ruediger Urbanke (EPFL) Johannes Huber (Erlangen) Steve Wicker (GeorgiaTech) Hideki Imai (Tokyo) Raymond Yeung (Hong Kong) Rodney Kennedy (Canberra) Bin Yu (Berkeley) Sanjeev Kulkarni (Princeton) Editorial Scope Foundations and Trends™ in Communications and Information Theory will publish survey and tutorial articles in the following topics: • Coded modulation • Multiuser detection • Coding theory and practice • Multiuser information theory • Communication complexity • Optical communication channels • Communication system design • Pattern recognition and learning • Cryptology
    [Show full text]
  • Network Information Theory
    Network Information Theory This comprehensive treatment of network information theory and its applications pro- vides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon’s point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless com- munication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia. Abbas El Gamal is the Hitachi America Chaired Professor in the School of Engineering and the Director of the Information Systems Laboratory in the Department of Electri- cal Engineering at Stanford University. In the field of network information theory, he is best known for his seminal contributions to the relay, broadcast, and interference chan- nels; multiple description coding; coding for noisy networks; and energy-efficient packet scheduling and throughput–delay tradeoffs in wireless networks. He is a Fellow of IEEE and the winner of the 2012 Claude E. Shannon Award, the highest honor in the field of information theory. Young-Han Kim is an Assistant Professor in the Department of Electrical and Com- puter Engineering at the University of California, San Diego.
    [Show full text]
  • Symposium in Remembrance of Rudolf Ahlswede
    in cooperation with Fakultät für Mathematik Department of Mathematics Symposium in Remembrance of Rudolf Ahlswede July 25 -26, 2011 Program and Booklet of Abstracts Symposium in Remembrance of Rudolf Ahlswede Bielefeld, Germany, July 25 -26, 2011 Program and Booklet of Abstracts Organizers: Harout Aydinian Ingo Alth¨ofer Ning Cai Ferdinando Cicalese Christian Deppe Gunter Dueck Ulrich Tamm Andreas Winter Contents 1 Program 1 2 Rudolf Ahlswede 1938-2010 5 Christian Deppe 3 Obituary of the ZIF 11 Manuela Lenzen 4 AZ-identity for regular posets 13 Harout Aydinian 5 Quantum information, the ambiguity of the past, and the complexity of the present 15 Charles Bennett 6 Local-global principles in discrete extremal problems 17 Sergei L. Bezrukov 7 Secure network coding 19 Ning Cai 8 Common randomness in information theory 21 Imre Csisz´ar 9 The deep impact of Rudolf Ahlswede on combinatorics 23 Gyula O. H. Katona 10 Common randomness and multiterminal secure computation 25 Prakash Narayan 11 String reconstruction from substring compositions 27 Alon Orlitsky 12 Stochastic search for locally clustered targets 29 K. R¨udigerReischuk 13 Information flows and bottle necks in dynamic communication networks 31 Soren Riis 14 On the complexity of families of binary sequences and lattices 33 Andras Sarkozy 15 Higher order extremal problems 35 L´aszl´oSz´ekely 16 A generalisation of the Gilbert-Varshamov bound and its asymptotic evaluation 37 Ludo Tolhuizen 17 Quantum channels and identification theory 39 Andreas Winter 18 List of Participants 41 iii Monday July 25, 2011 PROGRAM 10:15 Warm up: C. Bennett - Quantum information, the ambiguity of the past, and the complexity of the present 12:00 Welcome and registration at the ZiF - Chair C.
    [Show full text]
  • Reflections on Compressed Sensing, by E
    itNL1208.qxd 11/26/08 9:09 AM Page 1 IEEE Information Theory Society Newsletter Vol. 58, No. 4, December 2008 Editor: Daniela Tuninetti ISSN 1059-2362 Source Coding and Simulation XXIX Shannon Lecture, presented at the 2008 IEEE International Symposium on Information Theory, Toronto Canada Robert M. Gray Prologue Source coding/compression/quantization A unique aspect of the Shannon Lecture is the daunting fact that the lecturer has a year to prepare for (obsess over?) a single lec- source reproduction ture. The experience begins with the comfort of a seemingly infi- { } - bits- - Xn encoder decoder {Xˆn} nite time horizon and ends with a relativity-like speedup of time as the date approaches. I early on adopted a few guidelines: I had (1) a great excuse to review my more than four decades of Simulation/synthesis/fake process information theoretic activity and historical threads extending simulation even further back, (2) a strong desire to avoid repeating the top- - - ics and content I had worn thin during 2006–07 as an interconti- random bits coder {X˜n} nental itinerant lecturer for the Signal Processing Society, (3) an equally strong desire to revive some of my favorite topics from the mid 1970s—my most active and focused period doing Figure 1: Source coding and simulation. unadulterated information theory, and (4) a strong wish to add something new taking advantage of hindsight and experience, The goal of source coding [1] is to communicate or transmit preferably a new twist on some old ideas that had not been pre- the source through a constrained, discrete, noiseless com- viously fully exploited.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 66, No. 3, September 2016 Editor: Michael Langberg ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, Sergio Verdú, and Parham Noorzad President’s Column Alon Orlitsky ISIT in Barcelona was true joy. Like a Gaudi sion for our community along with extensive masterpiece, it was artfully planned and flaw- experience as board member, associate editor, lessly executed. Five captivating plenaries and a first-class researcher. Be-earlied con- covered the gamut from communication and gratulations, Madam President. coding to graphs and satisfiability, while Al- exander Holevo’s Shannon Lecture reviewed Other decisions and announcements con- the fascinating development of quantum cerned the society’s major awards, including channels from his early theoretical contribu- three Jack Wolf student paper awards and the tions to today’s near-practical innovations. James Massey Young Scholars Award that The remaining 620 talks were presented in 9 went to Andrea Montanari. Surprisingly, the parallel sessions and, extrapolating from those IT Paper Award was given to two papers, I attended, were all superb. Two records were “The Capacity Region of the Two-Receiver broken, with 888 participants this was the Gaussian Vector Broadcast Channel With Pri- largest ISIT outside the US, and at 540 Euro vate and Common Messages” by Yanlin Geng registration, the most economical in a decade. and Chandra Nair, and “Fundamental Limits of Caching” by Mohammad Maddah-Ali and Apropos records, and with the recent Rio Games, isn’t ISIT Urs Niesen. While Paper Awards were given to two related like the Olympics, except even better? As with the ultimate papers recently, not since 1972 were papers on different top- sports event, we convene to show our best results, further our ics jointly awarded.
    [Show full text]
  • Multivariate Decoding of Reed-Solomon Codes
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Algebraic list-decoding of error-correcting codes Permalink https://escholarship.org/uc/item/68q346tn Author Parvaresh, Farzad Publication Date 2007 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Algebraic List-Decoding of Error-Correcting Codes A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering (Communications Theory and Systems) by Farzad Parvaresh Committee in charge: Professor Alexander Vardy, Chair Professor Ilya Dumer Professor Alon Orlitsky Professor Paul H. Siegel Professor Jack K. Wolf 2007 Copyright Farzad Parvaresh, 2007 All rights reserved. The dissertation of Farzad Parvaresh is approved, and it is acceptable in quality and form for publication on microfilm: Chair University of California, San Diego 2007 iii To my parents iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . vii Acknowledgements . viii Vita and Publications . xi Abstract of the Dissertation . xii Chapter 1 Introduction . 1 1.1 Contributions . 5 1.2 Waiting for a bus in front of a pub . 8 1.2.1 Reed-Solomon codes . 9 1.2.2 Guruswami-Sudan algorithm . 10 1.2.3 Multivariate interpolation decoding algorithm . 12 1.3 Waiting for a bus on an April Fool’s day . 15 1.4 A new kind of Tic-Tac-Toe with multiplicity . 18 Chapter 2 Multivariate decoding of Reed-Solomon codes . 21 2.1 Introduction . 22 2.2 Preliminaries . 27 2.3 Error-correction radius of the MID algorithm .
    [Show full text]
  • A Review of Source Coding and Quantization 7 1.1 Lossless Compression and Entropy Coding
    MASSACHUsErr~, INfr MASSACHUSETTS INWT TUTE OF TECH,'.L,: Functional Quantization NOV 13 2008 by Vinith Misra LIBRARIES Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Bachelor of Science and Master of Engineering in Electrical Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2008 @ Massachusetts Institute of Technology 2008. All rights reserved. Author ............ Department of Electrical Engineering and Computer Science May 9, 2008 Certified by ............................... Vivek K Goyal Associate Professor Thesis Supervisor Accepted by .......... ... ...... ... Arthur C. Smith Chairman, Department Committee on Graduate Students ARCHIVES Functional Quantization by Vinith Misra Submitted to the Department of Electrical Engineering and Computer Science on May 9, 2008, in partial fulfillment of the requirements for the degrees of Bachelor of Science and Master of Engineering in Electrical Science and Engineering Abstract Data is rarely obtained for its own sake; oftentimes, it is a function of the data that we care about. Traditional data compression and quantization techniques, designed to recreate or approximate the data itself, gloss over this point. Are performance gains possible if source coding accounts for the user's function? How about when the encoders cannot themselves compute the function? We introduce the notion of functional quantization and use the tools of high-resolution analysis to get to the bottom of this question. Specifically, we consider real-valued raw data X N and scalar quantization of each component Xi of this data. First, under the constraints of fixed-rate quantization and variable-rate quantization, we obtain asymptotically optimal quantizer point densities and bit allocations.
    [Show full text]
  • Ieee-Level Awards
    IEEE-LEVEL AWARDS The IEEE currently bestows a Medal of Honor, fifteen Medals, thirty-three Technical Field Awards, two IEEE Service Awards, two Corporate Recognitions, two Prize Paper Awards, Honorary Memberships, one Scholarship, one Fellowship, and a Staff Award. The awards and their past recipients are listed below. Citations are available via the “Award Recipients with Citations” links within the information below. Nomination information for each award can be found by visiting the IEEE Awards Web page www.ieee.org/awards or by clicking on the award names below. Links are also available via the Recipient/Citation documents. MEDAL OF HONOR Ernst A. Guillemin 1961 Edward V. Appleton 1962 Award Recipients with Citations (PDF, 26 KB) John H. Hammond, Jr. 1963 George C. Southworth 1963 The IEEE Medal of Honor is the highest IEEE Harold A. Wheeler 1964 award. The Medal was established in 1917 and Claude E. Shannon 1966 Charles H. Townes 1967 is awarded for an exceptional contribution or an Gordon K. Teal 1968 extraordinary career in the IEEE fields of Edward L. Ginzton 1969 interest. The IEEE Medal of Honor is the highest Dennis Gabor 1970 IEEE award. The candidate need not be a John Bardeen 1971 Jay W. Forrester 1972 member of the IEEE. The IEEE Medal of Honor Rudolf Kompfner 1973 is sponsored by the IEEE Foundation. Rudolf E. Kalman 1974 John R. Pierce 1975 E. H. Armstrong 1917 H. Earle Vaughan 1977 E. F. W. Alexanderson 1919 Robert N. Noyce 1978 Guglielmo Marconi 1920 Richard Bellman 1979 R. A. Fessenden 1921 William Shockley 1980 Lee deforest 1922 Sidney Darlington 1981 John Stone-Stone 1923 John Wilder Tukey 1982 M.
    [Show full text]
  • IEEE Information Theory Society
    IEEE Information Theory Society The 2021 IEEE International Symposium on Information Theory Melbourne, Victoria, Australia Awards Ceremony July 2021 IEEE Medals & Technical Field Awards 2021 IEEE Medal of Honor The IEEE Medal of Honor, established in 1917, is the highest IEEE award. It is presented when a candidate is identified as having made a particular contribution that forms a clearly exceptional addition to the science and technology of concern to IEEE. Jacob Ziv For fundamental contributions to information theory and data compression technology, and for distinguished research leadership. 2021 IEEE Richard E. Hamming Medal Recognizes exceptional contributions to information sciences, systems, and technology, sponsored by Qualcomm. Raymond W. Yeung For fundamental contributions to information theory and pioneering network coding and its applications. 2021 IEEE Jack S. Kilby Signal Processing Medal Recognizes outstanding achievements in signal processing, sponsored by The Kilby Medal Fund. Emmanuel Candès For groundbreaking contributions to compressed sensing. 2021 IEEE Leon K. Kirchmayer Graduate Teaching Award Recognizes inspirational teaching of graduate students in the IEEE fields of interest, sponsored by the Leon K. Kirchmayer Memorial Fund. Andrea Goldsmith For educating, developing, guiding, and energizing generations of highly successful students and postdoctoral fellows. 2021 Eric E. Sumner Award Recognizes outstanding contributions to communications technology, sponsored by Nokia Bell Labs. En-hui Yang For contributions to the theory and practice of source coding. 1 2021 Claude E. Shannon Award Recognizes consistent and profound contributions to the field of information theory. Alon Orlitsky received B.Sc. degrees in Mathematics and Electrical Engineering from Ben Gurion University in 1980 and 1981, and M.Sc.
    [Show full text]
  • Report on the First Iran Workshop on Communication and Information Theory (IWCIT 2013)
    IEEE Information Theory Society Newsletter Vol. 63, No. 4, December 2013 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú President’s Column Gerhard Kramer The 2013 Information Theory Workshop was nominate outstanding dissertations by held in Sevilla, Spain, in mid-September. Be- Jan. 15, 2014. Instructions can be found at fore the Workshop began, the Board of Gov- www.itsoc.org. ernors held their third and final meeting of the year to discuss and vote on a variety of 3) The ISIT Student Paper Award was issues concerning our Society. I would like renamed the IEEE Jack Keil Wolf ISIT to thank the members of the “core” team for Student Paper Award. I appreciate Paul their support during this eventful year: past Siegel’s efforts in managing the change. and future presidents Giuseppe Caire, Mu- riel Médard, Abbas El Gamal, Michelle Eff- 4) A Shannon stamp initiative was started ros, and Alon Orlitsky, treasurer Aylin Yener, at the suggestion of Sergio Verdú, and secretary Edmund Yeh, conference commit- Michelle Effros kindly agreed to orga- tee chair Elza Erkip, and editors-in-chief nize a web page with electronic signa- Helmut Bölcskei and Yiannis Kontoyiannis. tures. If you have not done so already, please add your support at http:// The December column gives opportunity to list some of the www.itsoc.org/about/shannons-centenary-us- important changes that the Board deemed useful and neces- postal-stamp sary for 2014. These changes were thoroughly discussed by an active and supportive Board, and I appreciate their con- 5) Two new Annual Schools of Information Theory were structive comments, criticisms, and suggestions throughout founded in Australia and East Asia.
    [Show full text]
  • Information Theory and Network Coding Information Technology: Transmission, Processing, and Storage
    Information Theory and Network Coding Information Technology: Transmission, Processing, and Storage Series Editors: Robert Gallager Massachusetts Institute of Technology Cambridge, Massachusetts Jack Keil Wolf University of California at San Diego La Jolla, California Information Theory and Network Coding Raymond W. Yeung Networks and Grids: Technology and Theory Thomas G. Robertazzi CDMA Radio with Repeaters Joseph Shapira and Shmuel Miller Digital Satellite Communications Giovanni Corazza, ed. Immersive Audio Signal Processing Sunil Bharitkar and Chris Kyriakakis Digital Signal Processing for Measurement Systems: Theory and Applications Gabriele D’Antona and Alessandro Ferrero Coding for Wireless Channels Ezio Biglieri Wireless Networks: Multiuser Detection in Cross-Layer Design Christina Comaniciu, Narayan B. Mandayam and H. Vincent Poor The Multimedia Internet Stephen Weinstein MIMO Signals and Systems Horst J. Bessai Multi-Carrier Digital Communications: Theory and Applications of OFDM, 2nd Ed Ahmad R.S. Bahai, Burton R. Saltzberg and Mustafa Ergen Performance Analysis and Modeling of Digital Transmission Systems William Turin Wireless Communications Systems and Networks Mohsen Guizani Interference Avoidance Methods for Wireless Systems Dimitrie C. Popescu and Christopher Rose Stochastic Image Processing Chee Sun Won and Robert M. Gray Coded Modulation Systems John B. Anderson and Arne Svensson Communication System Design Using DSP Algorithms: With Laboratory Experiments for the TMS320C6701 and TMS320C6711 Steven A. Tretter (continued
    [Show full text]
  • IEEE Information Theory Society Board of Governors Meeting Minutes Boston Marriott Cambridge, Cambridge, 07.01.2012, 1-6Pm Natasha Devroye
    IEEE Information Theory Society Board of Governors meeting minutes Boston Marriott Cambridge, Cambridge, 07.01.2012, 1-6pm Natasha Devroye Present: Muriel Medard, Gerhard Kramer, Natasha Devroye, Frank Kschischang, Helmut Boelcskei, Emanuele Viterbo, Amin Shokrollahi, Michelle Effros, Alon Orlitsky, Max Costa, Jayne Cerone (IEEE), Alex Vardy, Giuseppe Caire, Urbashi Mitra, Paul Siegel, Abbas El Gamal, Bruce Hajek, Matthieu Bloch, Nicholas Laneman, Edmund Yeh, Rolf Johannesson, Alex Dimakis Prakash Narayan, Sriram Vishwanath, Aylin Yener, David Tse, Hans-Andrea Loeliger, Dave Forney, Sergio Verdu The meeting was called to order at 12:54pm by the Information Theory Society (ITsoc) President, Muriel Medard, who welcomed the Board of Governors (BoG). Everyone introduced themselves, including Jayne Cerone (guest) from IEEE. Jayne explained that she attends / observes BoG meetings and conferences of various societies. 1. Motion: The minutes of the BoG Meeting at ITA 2012 held at Catamaran Resort, La Jolla, were approved. 2. Motion: The agenda was approved. 3. Muriel presented the President's report. Committee activity updates were presented: Natasha Devroye stepping down as secretary, and Edmund Yeh is taking over. Negar Kiyavash will be taking over as WithITS coordinator from Christina Fragouli. The mentoring committee led by Joerg Kliewer and joined by Bobak Nazer and Elza Erkip is alive and well. The external nomination committee members are: Max Costa, Muriel Medard (ex officio), Prakash Narayan (chair), Alon Orlitsky, Han Vinck. Various ad hoc committee memberships were outlined, including the active ad-hoc committees on the Transactions. We are currently undergoing a Society review (occurs every 5 years). This February, Transactions were reviewed at the TAB meeting in Arizona; the rest of the Society review will take place in the November TAB meeting.
    [Show full text]