Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9063 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIV, 297 p. 29 illus) |
ISBN: | 9783319174709 9783319174693 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-17470-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544553 | ||
003 | DE-604 | ||
005 | 20150513 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319174709 |c Online |9 978-3-319-17470-9 | ||
020 | |a 9783319174693 |c Print |9 978-3-319-17469-3 | ||
024 | 7 | |a 10.1007/978-3-319-17470-9 |2 doi | |
035 | |a (OCoLC)908701631 | ||
035 | |a (DE-599)BVBBV042544553 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information Theoretic Security |b 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings |c edited by Anja Lehmann, Stefan Wolf |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIV, 297 p. 29 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9063 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsloses Beweissystem |0 (DE-588)4648342-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Secret-Sharing |0 (DE-588)4660818-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Lugano |2 gnd-content | |
689 | 0 | 0 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 0 | 1 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Secret-Sharing |0 (DE-588)4660818-7 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Informationsloses Beweissystem |0 (DE-588)4648342-1 |D s |
689 | 2 | 1 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Lehmann, Anja |e Sonstige |0 (DE-588)140863672 |4 oth | |
711 | 2 | |a ICITS |n 8. |d 2015 |c Lugano |j Sonstige |0 (DE-588)1069717797 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9063 |w (DE-604)BV014880109 |9 9063 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-17470-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978559 |
Datensatz im Suchindex
_version_ | 1804153310250270720 |
---|---|
adam_text | INFORMATION THEORETIC SECURITY
/ LEHMANN, ANJA
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PRACTICAL SHARING OF QUANTUM SECRETS OVER UNTRUSTED CHANNELS
GENERALIZING EFFICIENT MULTIPARTY COMPUTATION
ROUND-OPTIMAL PERFECTLY SECRET MESSAGE TRANSMISSION WITH LINEAR
COMMUNICATION COMPLEXITY
ON ZERO-KNOWLEDGE WITH STRICT POLYNOMIAL-TIME SIMULATION AND EXTRACTION
FROM DIFFERING-INPUT OBFUSCATION FOR CIRCUITS
UNIFYING LEAKAGE CLASSES: SIMULATABLE LEAKAGE AND PSEUDOENTROPY
ON THE ORTHOGONAL VECTOR PROBLEM AND THE FEASIBILITY OF UNCONDITIONALLY
SECURE LEAKAGE-RESILIENT COMPUTATION
METRIC PSEUDOENTROPY: CHARACTERIZATIONS, TRANSFORMATIONS AND
APPLICATIONS
NONUNIFORM INDISTINGUISHABILITY AND UNPREDICTABILITY HARDCORE LEMMAS:
NEW PROOFS AND APPLICATIONS TO PSEUDOENTROPY
GAMBLING, COMPUTATIONAL INFORMATION AND ENCRYPTION SECURITY
QUERY-COMPLEXITY AMPLIFICATION FOR RANDOM ORACLES
THE CHAINING LEMMA AND ITS APPLICATION
WEAKENING THE ISOLATION ASSUMPTION OF TAMPER-PROOF HARDWARE TOKENS
LIMITED VIEW ADVERSARY CODES: BOUNDS, CONSTRUCTIONS AND APPLICATIONS
LOCALLY DECODABLE CODES FOR EDIT DISTANCE
THE MULTIVARIATE HIDDEN NUMBER PROBLEM
LATTICE POINT ENUMERATION ON BLOCK REDUCED BASES
ADAPTIVE KEY RECOVERY ATTACKS ON NTRU-BASED SOMEWHAT HOMOMORPHIC
ENCRYPTION SCHEMES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION THEORETIC SECURITY
/ LEHMANN, ANJA
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED PROCEEDINGS OF THE 8TH
INTERNATIONAL CONFERENCE ON INFORMATION THEORETIC SECURITY, ICITS 2015,
HELD IN LUGANO, SWITZERLAND, IN MAY 2015. THE 17 FULL PAPERS PRESENTED
IN THIS VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 57 SUBMISSIONS.
THE PAPERS COVER A VARIETY OF TOPICS AT THE INTERSECTION OF
CRYPTOGRAPHY, INFORMATION THEORY, AND QUANTUM PHYSICS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)140863672 |
building | Verbundindex |
bvnumber | BV042544553 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701631 (DE-599)BVBBV042544553 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-17470-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03496nmm a2200757zcb4500</leader><controlfield tag="001">BV042544553</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150513 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319174709</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-17470-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319174693</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-17469-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-17470-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544553</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Theoretic Security</subfield><subfield code="b">8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings</subfield><subfield code="c">edited by Anja Lehmann, Stefan Wolf</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 297 p. 29 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9063</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsloses Beweissystem</subfield><subfield code="0">(DE-588)4648342-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Secret-Sharing</subfield><subfield code="0">(DE-588)4660818-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Lugano</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Secret-Sharing</subfield><subfield code="0">(DE-588)4660818-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informationsloses Beweissystem</subfield><subfield code="0">(DE-588)4648342-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lehmann, Anja</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)140863672</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICITS</subfield><subfield code="n">8.</subfield><subfield code="d">2015</subfield><subfield code="c">Lugano</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1069717797</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9063</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9063</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-17470-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978559</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Lugano gnd-content |
genre_facet | Konferenzschrift 2015 Lugano |
id | DE-604.BV042544553 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
institution_GND | (DE-588)1069717797 |
isbn | 9783319174709 9783319174693 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978559 |
oclc_num | 908701631 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIV, 297 p. 29 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings edited by Anja Lehmann, Stefan Wolf Cham Springer International Publishing 2015 1 Online-Ressource (XIV, 297 p. 29 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9063 0302-9743 Computer science Data protection Data encryption (Computer science) Coding theory Computer Science Systems and Data Security Data Encryption Coding and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Informationsloses Beweissystem (DE-588)4648342-1 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Secret-Sharing (DE-588)4660818-7 gnd rswk-swf Informationstheorie (DE-588)4026927-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Lugano gnd-content Informationstheorie (DE-588)4026927-9 s Codierungstheorie (DE-588)4139405-7 s Kryptologie (DE-588)4033329-2 s DE-604 Secret-Sharing (DE-588)4660818-7 s Kryptosystem (DE-588)4209132-9 s Informationsloses Beweissystem (DE-588)4648342-1 s Mehrparteienprotokoll (DE-588)4480818-5 s Lehmann, Anja Sonstige (DE-588)140863672 oth ICITS 8. 2015 Lugano Sonstige (DE-588)1069717797 oth Lecture Notes in Computer Science 9063 (DE-604)BV014880109 9063 https://doi.org/10.1007/978-3-319-17470-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Computer Science Systems and Data Security Data Encryption Coding and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Informationsloses Beweissystem (DE-588)4648342-1 gnd Kryptosystem (DE-588)4209132-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Secret-Sharing (DE-588)4660818-7 gnd Informationstheorie (DE-588)4026927-9 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4480818-5 (DE-588)4648342-1 (DE-588)4209132-9 (DE-588)4139405-7 (DE-588)4660818-7 (DE-588)4026927-9 (DE-588)1071861417 |
title | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings |
title_auth | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings |
title_exact_search | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings |
title_full | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings edited by Anja Lehmann, Stefan Wolf |
title_fullStr | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings edited by Anja Lehmann, Stefan Wolf |
title_full_unstemmed | Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings edited by Anja Lehmann, Stefan Wolf |
title_short | Information Theoretic Security |
title_sort | information theoretic security 8th international conference icits 2015 lugano switzerland may 2 5 2015 proceedings |
title_sub | 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Computer Science Systems and Data Security Data Encryption Coding and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Informationsloses Beweissystem (DE-588)4648342-1 gnd Kryptosystem (DE-588)4209132-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Secret-Sharing (DE-588)4660818-7 gnd Informationstheorie (DE-588)4026927-9 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Computer Science Systems and Data Security Data Encryption Coding and Information Theory Informatik Kryptologie Mehrparteienprotokoll Informationsloses Beweissystem Kryptosystem Codierungstheorie Secret-Sharing Informationstheorie Konferenzschrift 2015 Lugano |
url | https://doi.org/10.1007/978-3-319-17470-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT lehmannanja informationtheoreticsecurity8thinternationalconferenceicits2015luganoswitzerlandmay252015proceedings AT icitslugano informationtheoreticsecurity8thinternationalconferenceicits2015luganoswitzerlandmay252015proceedings |