Coverart for item
The Resource Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings, Carles Padró (ed.)

Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings, Carles Padró (ed.)

Label
Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
Title
Information theoretic security
Title remainder
7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
Statement of responsibility
Carles Padró (ed.)
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security
Member of
Cataloging source
NLGGC
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2013
http://bibfra.me/vocab/lite/meetingName
ICITS (Conference)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Padró, Carles
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL4, Security and cryptology
Series volume
8317
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer security
  • Data protection
  • Computer science
  • Data protection
  • Data encryption (Computer science)
  • Coding theory
  • Coding theory
  • Computer science
  • Computer security
  • Data encryption (Computer science)
  • Data protection
Label
Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings, Carles Padró (ed.)
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
How to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage
Control code
873552064
Extent
1 online resource (xii, 259 pages)
Form of item
online
Isbn
9783319042688
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 10.1007/978-3-319-04268-8
  • 10.1007/978-3-319-04
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)873552064
Label
Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings, Carles Padró (ed.)
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
How to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage
Control code
873552064
Extent
1 online resource (xii, 259 pages)
Form of item
online
Isbn
9783319042688
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 10.1007/978-3-319-04268-8
  • 10.1007/978-3-319-04
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)873552064

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...