Imagine asking for a specific address and getting
back a book with all possible addresses except the
one you sought. Is such a book possible? How can it
be created? Does it influence the manner in which
information can be exploited? Alternatively, imagine
having access only to some of the streets names and
some of the numbers not present in the address. What
can we learn from such data? How can such data arise?
In this book I provide some answers to these
questions and look into specific situations where
schemes of this sort might be appropriate and even
natural by touching on areas as varied as immunology,
sociology, and cryptography.
back a book with all possible addresses except the
one you sought. Is such a book possible? How can it
be created? Does it influence the manner in which
information can be exploited? Alternatively, imagine
having access only to some of the streets names and
some of the numbers not present in the address. What
can we learn from such data? How can such data arise?
In this book I provide some answers to these
questions and look into specific situations where
schemes of this sort might be appropriate and even
natural by touching on areas as varied as immunology,
sociology, and cryptography.