|
|
|
|
LEADER |
10544cam a22015252 4500 |
001 |
183-1651694230 |
003 |
DE-627 |
005 |
20240125001945.0 |
007 |
cr uuu---uuuuu |
008 |
120904s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642322846
|9 978-3-642-32284-6
|
024 |
7 |
|
|a 10.1007/978-3-642-32284-6
|2 doi
|
035 |
|
|
|a (DE-627)1651694230
|
035 |
|
|
|a (DE-576)370651626
|
035 |
|
|
|a (DE-599)BSZ370651626
|
035 |
|
|
|a (OCoLC)812052362
|
035 |
|
|
|a (ZBM)1250.94008
|
035 |
|
|
|a (ZBM)1250.94008
|
035 |
|
|
|a (DE-He213)978-3-642-32284-6
|
035 |
|
|
|a (EBP)040543757
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 94A62
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 53.71
|2 bkl
|
084 |
|
|
|a 54.10
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Smith, Adam
|4 aut
|
245 |
1 |
0 |
|a Information Theoretic Security
|b 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
|c edited by Adam Smith
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2012
|
300 |
|
|
|a Online-Ressource (XI, 219 p. 28 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7412
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Computers and civilization.
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Montréal
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4026927-9
|0 (DE-627)106286595
|0 (DE-576)208968555
|a Informationstheorie
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4139405-7
|0 (DE-627)105635618
|0 (DE-576)209694084
|a Codierungstheorie
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4660818-7
|0 (DE-627)336841558
|0 (DE-576)214764249
|a Secret-Sharing
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4648342-1
|0 (DE-627)333133455
|0 (DE-576)21463731X
|a Informationsloses Beweissystem
|2 gnd
|
689 |
2 |
1 |
|D s
|0 (DE-588)4480818-5
|0 (DE-627)238164551
|0 (DE-576)212876295
|a Mehrparteienprotokoll
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
689 |
3 |
0 |
|D s
|0 (DE-588)4026927-9
|0 (DE-627)106286595
|0 (DE-576)208968555
|a Informationstheorie
|2 gnd
|
689 |
3 |
1 |
|D s
|0 (DE-588)4139405-7
|0 (DE-627)105635618
|0 (DE-576)209694084
|a Codierungstheorie
|2 gnd
|
689 |
3 |
2 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
3 |
|
|5 (DE-627)
|
776 |
1 |
|
|z 9783642322839
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Information theoretic security
|d Berlin : Springer, 2012
|h VIII, 204 S.
|w (DE-627)719743451
|w (DE-576)382923774
|z 3642322832
|z 9783642322839
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7412
|9 7412
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-32284-6
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32284-6
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz370651626cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130405112908
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1250.94008
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)723767289
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
912 |
|
|
|a SSG-OPC-mat
|
924 |
1 |
|
|a 135048721X
|b DE-84
|9 84
|c GBV
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1326315102
|b DE-46
|9 46
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 132513757X
|b DE-18
|9 18
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|k http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1326307215
|b DE-Ilm1
|9 Ilm 1
|c GBV
|d d
|g Online-Ressource
|h Internet
|
924 |
1 |
|
|a 4304901826
|b DE-705
|9 705
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1326328484
|b DE-28
|9 28
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 132514715X
|b DE-Ma9
|9 Ma 9
|c GBV
|d d
|g eBook Springer
|k https://doi.org/10.1007/978-3-642-32284-6
|k https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1325150703
|b DE-Ma14
|9 Ma 14
|c GBV
|d d
|g eBook Springer
|k https://doi.org/10.1007/978-3-642-32284-6
|k https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1325161748
|b DE-841
|9 841
|c GBV
|d d
|g KaufEBook202103
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1326320599
|b DE-715
|9 715
|c GBV
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1752947398
|b DE-715
|9 715
|c GBV
|d d
|k http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991016133258403501
|l standalone Portfolios
|l Campusweiter Zugriff (Universität Oldenburg). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden.
|
924 |
1 |
|
|a 1325155837
|b DE-700
|9 700
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 1326336517
|b DE-517
|9 517
|c GBV
|d d
|k https://doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843321
|b DE-25
|9 25
|c BSZ
|d d
|k http://www.redi-bw.de/start/unifr/EBooks-springer/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843348
|b DE-291
|9 291
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zugriff nur aus dem Universitätsnetz
|
924 |
1 |
|
|a 3351843372
|b DE-14
|9 14
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843380
|b DE-352E
|9 352E
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843437
|b DE-180
|9 180
|c BSZ
|d d
|k http://primo-49man.hosted.exlibrisgroup.com/openurl/MAN/MAN_UB_service_page?u.ignore_date_coverage=true&rft.mms_id=9918336575902561
|l BSO
|
924 |
1 |
|
|a 3351843445
|b DE-15
|9 15
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843453
|b DE-90
|9 90
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843461
|b DE-90
|9 90
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 335184347X
|b DE-Ch1
|9 Ch 1
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 335184350X
|b DE-Rt2
|9 Rt 2
|c BSZ
|d d
|g eBook
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l E-BOOK: Link zum Volltext - nur auf dem Campus verfügbar
|
924 |
1 |
|
|a 3351843526
|b DE-Zi4
|9 Zi 4
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|
924 |
1 |
|
|a 3351843542
|b DE-840
|9 840
|c BSZ
|d d
|g Springer E-Book
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Nur aus dem Campusnetz erreichbar
|
924 |
1 |
|
|a 3351843569
|b DE-Kon4
|9 Kon 4
|c BSZ
|d d
|g eBook Springer
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Nur aus dem Campusnetz erreichbar
|
924 |
1 |
|
|a 3351843593
|b DE-520
|9 520
|c BSZ
|d d
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|
924 |
1 |
|
|a 3351843615
|b DE-Fn1
|9 Fn 1
|c BSZ
|d d
|g eBook Springer
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Campuslizenz / extern auch via VPN oder Shibboleth
|
924 |
1 |
|
|a 3711409636
|b DE-Ofb1
|9 Ofb 1
|c BSZ
|d d
|g E-Book Springer
|k https://doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Zugang im Hochschulnetz der HS Offenburg / extern via VPN oder Shibboleth (Login über Institution)
|
924 |
1 |
|
|a 3351843631
|b DE-Loer2
|9 Lör 2
|c BSZ
|d d
|g eBook Springer
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Nur aus dem Campusnetz erreichbar
|
924 |
1 |
|
|a 335184364X
|b DE-Loer2-1
|9 Lör 2/1
|c BSZ
|d d
|g eBook Springer
|k http://dx.doi.org/10.1007/978-3-642-32284-6
|l Zum Online-Dokument
|l Nur aus dem Campusnetz erreichbar
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 53.71
|j Theoretische Nachrichtentechnik
|q SEPA
|0 (DE-627)10641870X
|
936 |
b |
k |
|a 54.10
|j Theoretische Informatik
|q SEPA
|0 (DE-627)106418815
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
980 |
|
|
|a 1651694230
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1796609849827524608 |
author |
Smith, Adam |
author_facet |
Smith, Adam |
author_role |
aut |
author_sort |
Smith, Adam |
author_variant |
a s as |
building |
Library A |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat, sid-183-col-kxpbbi |
contents |
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security. |
ctrlnum |
(DE-627)1651694230, (DE-576)370651626, (DE-599)BSZ370651626, (OCoLC)812052362, (ZBM)1250.94008, (DE-He213)978-3-642-32284-6, (EBP)040543757 |
doi_str_mv |
10.1007/978-3-642-32284-6 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat |
facet_avail |
Online |
facet_local_del330 |
Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience, engineering-electrical |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Montréal |
hierarchy_parent_id |
183-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7412 |
hierarchy_top_id |
183-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
183-1651694230 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2012 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
183-1651694230 |
is_hierarchy_title |
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings |
isbn |
9783642322846 |
isbn_isn_mv |
9783642322839, 3642322832 |
issn_isn_mv |
1611-3349 |
language |
English |
last_indexed |
2024-04-17T19:04:29.291Z |
marc024a_ct_mv |
10.1007/978-3-642-32284-6 |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @189217c |
match_str |
smith2012informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings |
mega_collection |
K10plus Verbundkatalog |
multipart_link |
093890923 |
multipart_part |
(093890923)7412 |
oclc_num |
812052362 |
physical |
Online-Ressource (XI, 219 p. 28 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
1651694230 |
recordtype |
marcfinc |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7412 |
series2 |
Lecture Notes in Computer Science ; 7412, SpringerLink ; Bücher |
source_id |
183 |
spelling |
Smith, Adam aut, Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith, Berlin, Heidelberg Springer 2012, Online-Ressource (XI, 219 p. 28 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7412, SpringerLink Bücher, Literaturangaben, This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security., Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4026927-9 (DE-627)106286595 (DE-576)208968555 Informationstheorie gnd, s (DE-588)4139405-7 (DE-627)105635618 (DE-576)209694084 Codierungstheorie gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, DE-101, s (DE-588)4660818-7 (DE-627)336841558 (DE-576)214764249 Secret-Sharing gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4648342-1 (DE-627)333133455 (DE-576)21463731X Informationsloses Beweissystem gnd, s (DE-588)4480818-5 (DE-627)238164551 (DE-576)212876295 Mehrparteienprotokoll gnd, (DE-627), 9783642322839, Buchausg. u.d.T. Information theoretic security Berlin : Springer, 2012 VIII, 204 S. (DE-627)719743451 (DE-576)382923774 3642322832 9783642322839, Lecture notes in computer science 7412 7412 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-32284-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-32284-6 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz370651626cov.jpg V:DE-576 X:springer image/jpeg 20130405112908 Cover, https://zbmath.org/?q=an:1250.94008 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, (DE-627)723767289 |
spellingShingle |
Smith, Adam, Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings, Lecture notes in computer science, 7412, This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security., Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal, Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
title |
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings |
title_auth |
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings |
title_full |
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith |
title_fullStr |
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith |
title_full_unstemmed |
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith |
title_in_hierarchy |
7412. Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings (2012) |
title_short |
Information Theoretic Security |
title_sort |
information theoretic security 6th international conference, icits 2012, montreal, qc, canada, august 15-17, 2012. proceedings |
title_sub |
6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings |
title_unstemmed |
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings |
topic |
Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal, Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
topic_facet |
Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
url |
https://doi.org/10.1007/978-3-642-32284-6, http://dx.doi.org/10.1007/978-3-642-32284-6, https://swbplus.bsz-bw.de/bsz370651626cov.jpg, https://zbmath.org/?q=an:1250.94008, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm |
work_keys_str_mv |
AT smithadam informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings |