Information theoretic security: 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
5973 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | X, 247 S. graph. Darst. 24 cm |
ISBN: | 9783642144950 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036664991 | ||
003 | DE-604 | ||
005 | 20101104 | ||
007 | t | ||
008 | 100913s2010 d||| |||| 10||| eng d | ||
015 | |a 10,N25 |2 dnb | ||
016 | 7 | |a 1003553494 |2 DE-101 | |
020 | |a 9783642144950 |c kart. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-14495-0 | ||
024 | 3 | |a 9783642144950 | |
028 | 5 | 2 | |a 80018317 |
035 | |a (OCoLC)665158707 | ||
035 | |a (DE-599)DNB1003553494 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information theoretic security |b 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers |c Kaoru Kurosawa (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a X, 247 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5973 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Secret-Sharing |0 (DE-588)4660818-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronischer Fingerabdruck |0 (DE-588)4582425-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Shizuoka |2 gnd-content | |
689 | 0 | 0 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 0 | 1 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Secret-Sharing |0 (DE-588)4660818-7 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Elektronischer Fingerabdruck |0 (DE-588)4582425-3 |D s |
689 | 2 | 1 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Kurosawa, Kaoru |e Sonstige |0 (DE-588)133874583 |4 oth | |
711 | 2 | |a ICITS |n 4 |d 2009 |c Shizuoka |j Sonstige |0 (DE-588)16081527-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5973 |w (DE-604)BV000000607 |9 5973 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3493213&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020584196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020584196 |
Datensatz im Suchindex
_version_ | 1805094617028231168 |
---|---|
adam_text |
TABLE OF CONTENTS LEAKAGE RESILIENT CRYPTOGRAPHY SURVEY: LEAKAGE
RESILIENCE AND THE BOUNDED RETRIEVAL MODEL 1 JOEL ALMEN, YEVGENIY DODIS,
AND DANIEL WICHS A LOWER BOUND ON THE KEY LENGTH OF
INFORMATION-THEORETIC FORWARD-SECURE STORAGE SCHEMES 19 STEFAN
DZIEMBOWSKI QUANTUM CRYPTOGRAPHY AND INDISTINGUISHABILITY SECURITY OF
KEY DISTRIBUTION AND COMPLEMENTARITY IN QUANTUM MECHANICS 27 MASATO
KOASHI FREE-START DISTINGUISHING: COMBINING TWO TYPES OF
INDISTINGUISHABILITY AMPLIFICATION 28 PETER GAZI AND UELI MAURER
CONNECTION TO COMPUTATIONAL SECURITY CODE-BASED PUBLIC-KEY CRYPTOSYSTEMS
AND THEIR APPLICATIONS 45 KAZUKUNI KOBARA ON THE SECURITY OF
PSEUDORANDOMIZED INFORMATION-THEORETICALLY SECURE SCHEMES 56 KOJI NUIDA
AND GOICHIRO HANAOKA SECRET SHARING EFFICIENT STATISTICAL ASYNCHRONOUS
VERIFIABLE SECRET SHARING WITH OPTIMAL RESILIENCE 74 ARPITA PATRA,
ASHISH CHOUDHARY, AND C. PANDU RANGAN ON THE OPTIMIZATION OF BIPARTITE
SECRET SHARING SCHEMES 93 ORIOL FARRAS, JESSICA RUTH METCALF-BURTON,
CARLES PADRO, AND LEONOR VAZQUEZ LINEAR THRESHOLD MULTISECRET SHARING
SCHEMES 110 ORIOL FARRAS, IGNACIO GRACIA, SEBASTIA MARTIN, AND CARLES
PADRO BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1003553494
DIGITALISIERT DURCH 249 X TABLE OI CONTENTS KEY AGREEMENT FROM COMMON
RANDOMNESS MULTITERMINAL SECRECY GENERATION AND TREE PACKING 127 PRAKASH
NARAYAN INFORMATION THEORETIC SECURITY BASED ON BOUNDED OBSERVABILITY
128 JUN MURAMATSU, KAZUYUKI YOSHIMURA, AND PETER DAVIS RANDOM GRAPH AND
GROUP TESTING GROUP TESTING AND BATCH VERIFICATION 140 GREGORY M.
ZAVERUCHA AND DOUGLAS R. STINSON RELIABLE DATA TRANSMISION AND
COMPUTATION WHAT CAN CRYPTOGRAPHY DO FOR CODING THEORY? 158 ADAM SMITH
CRYPTANALYSIS OF SECURE MESSAGE TRANSMISSION PROTOCOLS WITH FEEDBACK 159
QIUSHI YANG AND YVO DESMEDT THE OPTIMUM LEAKAGE PRINCIPLE FOR ANALYZING
MULTI-THREADED PROGRAMS 177 HAN CHEN AND PASQUALE MALACARIA FINGERPRINT
AND WATERMARKING A GENERAL CONVERSION METHOD OF FINGERPRINT CODES TO
(MORE) ROBUST FINGERPRINT CODES AGAINST BIT ERASURE 194 KOJI NUIDA AN
IMPROVEMENT OF PSEUDORANDOMIZATION AGAINST UNBOUNDED ATTACK ALGORITHMS -
THE CASE OF FINGERPRINT CODES 213 KOJI NUIDA AND GOICHIRO HANAOKA
STATISTICAL-MECHANICAL APPROACH FOR MULTIPLE WATERMARKS USING SPECTRUM
SPREADING 231 KAZUHIRO SENDA AND MASAKI KAWAMURA AUTHOR INDEX |
any_adam_object | 1 |
author_GND | (DE-588)133874583 |
building | Verbundindex |
bvnumber | BV036664991 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)665158707 (DE-599)DNB1003553494 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036664991</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101104</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100913s2010 d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N25</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1003553494</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642144950</subfield><subfield code="c">kart. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-14495-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642144950</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80018317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)665158707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1003553494</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information theoretic security</subfield><subfield code="b">4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers</subfield><subfield code="c">Kaoru Kurosawa (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 247 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5973</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Secret-Sharing</subfield><subfield code="0">(DE-588)4660818-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronischer Fingerabdruck</subfield><subfield code="0">(DE-588)4582425-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Shizuoka</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Secret-Sharing</subfield><subfield code="0">(DE-588)4660818-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Elektronischer Fingerabdruck</subfield><subfield code="0">(DE-588)4582425-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kurosawa, Kaoru</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133874583</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICITS</subfield><subfield code="n">4</subfield><subfield code="d">2009</subfield><subfield code="c">Shizuoka</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16081527-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5973</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5973</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3493213&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020584196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020584196</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Shizuoka gnd-content |
genre_facet | Konferenzschrift 2009 Shizuoka |
id | DE-604.BV036664991 |
illustrated | Illustrated |
indexdate | 2024-07-20T10:46:13Z |
institution | BVB |
institution_GND | (DE-588)16081527-7 |
isbn | 9783642144950 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020584196 |
oclc_num | 665158707 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
physical | X, 247 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers Kaoru Kurosawa (ed.) Berlin [u.a.] Springer 2010 X, 247 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5973 Literaturangaben Secret-Sharing (DE-588)4660818-7 gnd rswk-swf Informationstheorie (DE-588)4026927-9 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Elektronischer Fingerabdruck (DE-588)4582425-3 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Shizuoka gnd-content Informationstheorie (DE-588)4026927-9 s Codierungstheorie (DE-588)4139405-7 s Kryptologie (DE-588)4033329-2 s DE-604 Secret-Sharing (DE-588)4660818-7 s Kryptosystem (DE-588)4209132-9 s Elektronischer Fingerabdruck (DE-588)4582425-3 s Elektronisches Wasserzeichen (DE-588)4572344-8 s Kurosawa, Kaoru Sonstige (DE-588)133874583 oth ICITS 4 2009 Shizuoka Sonstige (DE-588)16081527-7 oth Lecture notes in computer science 5973 (DE-604)BV000000607 5973 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3493213&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020584196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers Lecture notes in computer science Secret-Sharing (DE-588)4660818-7 gnd Informationstheorie (DE-588)4026927-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Elektronischer Fingerabdruck (DE-588)4582425-3 gnd Kryptosystem (DE-588)4209132-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4660818-7 (DE-588)4026927-9 (DE-588)4572344-8 (DE-588)4582425-3 (DE-588)4209132-9 (DE-588)4139405-7 (DE-588)4033329-2 (DE-588)1071861417 |
title | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers |
title_auth | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers |
title_exact_search | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers |
title_full | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers Kaoru Kurosawa (ed.) |
title_fullStr | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers Kaoru Kurosawa (ed.) |
title_full_unstemmed | Information theoretic security 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers Kaoru Kurosawa (ed.) |
title_short | Information theoretic security |
title_sort | information theoretic security 4th international conference icits 2009 shizuoka japan december 3 6 2009 revised selected papers |
title_sub | 4th international conference, ICITS 2009, Shizuoka, Japan, December 3 - 6, 2009 ; revised selected papers |
topic | Secret-Sharing (DE-588)4660818-7 gnd Informationstheorie (DE-588)4026927-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Elektronischer Fingerabdruck (DE-588)4582425-3 gnd Kryptosystem (DE-588)4209132-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Secret-Sharing Informationstheorie Elektronisches Wasserzeichen Elektronischer Fingerabdruck Kryptosystem Codierungstheorie Kryptologie Konferenzschrift 2009 Shizuoka |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3493213&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020584196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kurosawakaoru informationtheoreticsecurity4thinternationalconferenceicits2009shizuokajapandecember362009revisedselectedpapers AT icitsshizuoka informationtheoreticsecurity4thinternationalconferenceicits2009shizuokajapandecember362009revisedselectedpapers |