Information Theoretic Security : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings

Bibliographische Detailangaben

Titel
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
verantwortlich
Smith, Adam (VerfasserIn)
Schriftenreihe
Lecture Notes in Computer Science ; 7412
veröffentlicht
Berlin, Heidelberg: Springer, 2012
Erscheinungsjahr
2012
Teil von
SpringerLink
Teil von
Lecture notes in computer science ; 7412
Buchausg. u.d.T.
Information theoretic security, Berlin : Springer, 2012, VIII, 204 S.
Andere Ausgaben
Information theoretic security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings
Mehr ...
Medientyp
E-Book Konferenzbericht
Datenquelle
K10plus Verbundkatalog
Tags
Tag hinzufügen

Zugang

Weitere Informationen sehen Sie, wenn Sie angemeldet sind. Noch keinen Account? Jetzt registrieren.

LEADER 10544cam a22015252 4500
001 183-1651694230
003 DE-627
005 20240125001945.0
007 cr uuu---uuuuu
008 120904s2012 gw |||||o 00| ||eng c
020 |a 9783642322846  |9 978-3-642-32284-6 
024 7 |a 10.1007/978-3-642-32284-6  |2 doi 
035 |a (DE-627)1651694230 
035 |a (DE-576)370651626 
035 |a (DE-599)BSZ370651626 
035 |a (OCoLC)812052362 
035 |a (ZBM)1250.94008 
035 |a (ZBM)1250.94008 
035 |a (DE-He213)978-3-642-32284-6 
035 |a (EBP)040543757 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 94A62  |2 msc 
084 |a 00B25  |2 msc 
084 |a 53.71  |2 bkl 
084 |a 54.10  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Smith, Adam  |4 aut 
245 1 0 |a Information Theoretic Security  |b 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings  |c edited by Adam Smith 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2012 
300 |a Online-Ressource (XI, 219 p. 28 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7412 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security. 
650 0 |a Computer science 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Information Systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Cryptography. 
650 0 |a Information theory. 
650 0 |a Electronic commerce. 
650 0 |a Electronic data processing 
650 0 |a Computers and civilization. 
655 7 |a Konferenzschrift  |y 2012  |z Montréal  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4026927-9  |0 (DE-627)106286595  |0 (DE-576)208968555  |a Informationstheorie  |2 gnd 
689 0 1 |D s  |0 (DE-588)4139405-7  |0 (DE-627)105635618  |0 (DE-576)209694084  |a Codierungstheorie  |2 gnd 
689 0 2 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4660818-7  |0 (DE-627)336841558  |0 (DE-576)214764249  |a Secret-Sharing  |2 gnd 
689 1 1 |D s  |0 (DE-588)4209132-9  |0 (DE-627)105106836  |0 (DE-576)210190086  |a Kryptosystem  |2 gnd 
689 1 |5 DE-101 
689 2 0 |D s  |0 (DE-588)4648342-1  |0 (DE-627)333133455  |0 (DE-576)21463731X  |a Informationsloses Beweissystem  |2 gnd 
689 2 1 |D s  |0 (DE-588)4480818-5  |0 (DE-627)238164551  |0 (DE-576)212876295  |a Mehrparteienprotokoll  |2 gnd 
689 2 |5 DE-101 
689 3 0 |D s  |0 (DE-588)4026927-9  |0 (DE-627)106286595  |0 (DE-576)208968555  |a Informationstheorie  |2 gnd 
689 3 1 |D s  |0 (DE-588)4139405-7  |0 (DE-627)105635618  |0 (DE-576)209694084  |a Codierungstheorie  |2 gnd 
689 3 2 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 3 |5 (DE-627) 
776 1 |z 9783642322839 
776 0 8 |i Buchausg. u.d.T.  |t Information theoretic security  |d Berlin : Springer, 2012  |h VIII, 204 S.  |w (DE-627)719743451  |w (DE-576)382923774  |z 3642322832  |z 9783642322839 
830 0 |a Lecture notes in computer science  |v 7412  |9 7412  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-32284-6  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32284-6  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz370651626cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20130405112908  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1250.94008  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
856 4 2 |u http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm  |m X: MVB  |q text/html  |v 2013-05-01  |x Verlag  |3 Inhaltstext 
889 |w (DE-627)723767289 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
912 |a SSG-OPC-mat 
924 1 |a 135048721X  |b DE-84  |9 84  |c GBV  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1326315102  |b DE-46  |9 46  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 132513757X  |b DE-18  |9 18  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6  |k http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1326307215  |b DE-Ilm1  |9 Ilm 1  |c GBV  |d d  |g Online-Ressource  |h Internet 
924 1 |a 4304901826  |b DE-705  |9 705  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1326328484  |b DE-28  |9 28  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 132514715X  |b DE-Ma9  |9 Ma 9  |c GBV  |d d  |g eBook Springer  |k https://doi.org/10.1007/978-3-642-32284-6  |k https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1325150703  |b DE-Ma14  |9 Ma 14  |c GBV  |d d  |g eBook Springer  |k https://doi.org/10.1007/978-3-642-32284-6  |k https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1325161748  |b DE-841  |9 841  |c GBV  |d d  |g KaufEBook202103  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1326320599  |b DE-715  |9 715  |c GBV  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1752947398  |b DE-715  |9 715  |c GBV  |d d  |k http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991016133258403501  |l standalone Portfolios  |l Campusweiter Zugriff (Universität Oldenburg). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden. 
924 1 |a 1325155837  |b DE-700  |9 700  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 1326336517  |b DE-517  |9 517  |c GBV  |d d  |k https://doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843321  |b DE-25  |9 25  |c BSZ  |d d  |k http://www.redi-bw.de/start/unifr/EBooks-springer/10.1007/978-3-642-32284-6 
924 1 |a 3351843348  |b DE-291  |9 291  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zugriff nur aus dem Universitätsnetz 
924 1 |a 3351843372  |b DE-14  |9 14  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843380  |b DE-352E  |9 352E  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843437  |b DE-180  |9 180  |c BSZ  |d d  |k http://primo-49man.hosted.exlibrisgroup.com/openurl/MAN/MAN_UB_service_page?u.ignore_date_coverage=true&rft.mms_id=9918336575902561  |l BSO 
924 1 |a 3351843445  |b DE-15  |9 15  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843453  |b DE-90  |9 90  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843461  |b DE-90  |9 90  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 335184347X  |b DE-Ch1  |9 Ch 1  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 335184350X  |b DE-Rt2  |9 Rt 2  |c BSZ  |d d  |g eBook  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l E-BOOK: Link zum Volltext - nur auf dem Campus verfügbar 
924 1 |a 3351843526  |b DE-Zi4  |9 Zi 4  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument 
924 1 |a 3351843542  |b DE-840  |9 840  |c BSZ  |d d  |g Springer E-Book  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Nur aus dem Campusnetz erreichbar 
924 1 |a 3351843569  |b DE-Kon4  |9 Kon 4  |c BSZ  |d d  |g eBook Springer  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Nur aus dem Campusnetz erreichbar 
924 1 |a 3351843593  |b DE-520  |9 520  |c BSZ  |d d  |k http://dx.doi.org/10.1007/978-3-642-32284-6 
924 1 |a 3351843615  |b DE-Fn1  |9 Fn 1  |c BSZ  |d d  |g eBook Springer  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Campuslizenz / extern auch via VPN oder Shibboleth 
924 1 |a 3711409636  |b DE-Ofb1  |9 Ofb 1  |c BSZ  |d d  |g E-Book Springer  |k https://doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Zugang im Hochschulnetz der HS Offenburg / extern via VPN oder Shibboleth (Login über Institution) 
924 1 |a 3351843631  |b DE-Loer2  |9 Lör 2  |c BSZ  |d d  |g eBook Springer  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Nur aus dem Campusnetz erreichbar 
924 1 |a 335184364X  |b DE-Loer2-1  |9 Lör 2/1  |c BSZ  |d d  |g eBook Springer  |k http://dx.doi.org/10.1007/978-3-642-32284-6  |l Zum Online-Dokument  |l Nur aus dem Campusnetz erreichbar 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 53.71  |j Theoretische Nachrichtentechnik  |q SEPA  |0 (DE-627)10641870X 
936 b k |a 54.10  |j Theoretische Informatik  |q SEPA  |0 (DE-627)106418815 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
980 |a 1651694230  |b 183  |c sid-183-col-kxpbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Information+Theoretic+Security%3A+6th+International+Conference%2C+ICITS+2012%2C+Montreal%2C+QC%2C+Canada%2C+August+15-17%2C+2012.+Proceedings&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Information+Theoretic+Security%3A+6th+International+Conference%2C+ICITS+2012%2C+Montreal%2C+QC%2C+Canada%2C+August+15-17%2C+2012.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7412&rft.au=Smith%2C+Adam&rft.pub=Springer&rft.edition=&rft.isbn=3642322840
SOLR
_version_ 1796609849827524608
author Smith, Adam
author_facet Smith, Adam
author_role aut
author_sort Smith, Adam
author_variant a s as
building Library A
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat, sid-183-col-kxpbbi
contents This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
ctrlnum (DE-627)1651694230, (DE-576)370651626, (DE-599)BSZ370651626, (OCoLC)812052362, (ZBM)1250.94008, (DE-He213)978-3-642-32284-6, (EBP)040543757
doi_str_mv 10.1007/978-3-642-32284-6
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat
facet_avail Online
facet_local_del330 Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience, engineering-electrical
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Montréal
hierarchy_parent_id 183-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7412
hierarchy_top_id 183-316228877
hierarchy_top_title Lecture notes in computer science
id 183-1651694230
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2012
imprint_str_mv Berlin, Heidelberg: Springer, 2012
institution FID-BBI-DE-23
is_hierarchy_id 183-1651694230
is_hierarchy_title Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
isbn 9783642322846
isbn_isn_mv 9783642322839, 3642322832
issn_isn_mv 1611-3349
language English
last_indexed 2024-04-17T19:04:29.291Z
marc024a_ct_mv 10.1007/978-3-642-32284-6
marc_error [geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @189217c
match_str smith2012informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings
mega_collection K10plus Verbundkatalog
multipart_link 093890923
multipart_part (093890923)7412
oclc_num 812052362
physical Online-Ressource (XI, 219 p. 28 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 1651694230
recordtype marcfinc
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7412
series2 Lecture Notes in Computer Science ; 7412, SpringerLink ; Bücher
source_id 183
spelling Smith, Adam aut, Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith, Berlin, Heidelberg Springer 2012, Online-Ressource (XI, 219 p. 28 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7412, SpringerLink Bücher, Literaturangaben, This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security., Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4026927-9 (DE-627)106286595 (DE-576)208968555 Informationstheorie gnd, s (DE-588)4139405-7 (DE-627)105635618 (DE-576)209694084 Codierungstheorie gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, DE-101, s (DE-588)4660818-7 (DE-627)336841558 (DE-576)214764249 Secret-Sharing gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4648342-1 (DE-627)333133455 (DE-576)21463731X Informationsloses Beweissystem gnd, s (DE-588)4480818-5 (DE-627)238164551 (DE-576)212876295 Mehrparteienprotokoll gnd, (DE-627), 9783642322839, Buchausg. u.d.T. Information theoretic security Berlin : Springer, 2012 VIII, 204 S. (DE-627)719743451 (DE-576)382923774 3642322832 9783642322839, Lecture notes in computer science 7412 7412 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-32284-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-32284-6 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz370651626cov.jpg V:DE-576 X:springer image/jpeg 20130405112908 Cover, https://zbmath.org/?q=an:1250.94008 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, (DE-627)723767289
spellingShingle Smith, Adam, Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings, Lecture notes in computer science, 7412, This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security., Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal, Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll
title Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
title_auth Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
title_full Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith
title_fullStr Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith
title_full_unstemmed Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings edited by Adam Smith
title_in_hierarchy 7412. Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings (2012)
title_short Information Theoretic Security
title_sort information theoretic security 6th international conference, icits 2012, montreal, qc, canada, august 15-17, 2012. proceedings
title_sub 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
title_unstemmed Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
topic Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift 2012 Montréal, Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll
topic_facet Computer science, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Electronic data processing, Computers and civilization., Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll
url https://doi.org/10.1007/978-3-642-32284-6, http://dx.doi.org/10.1007/978-3-642-32284-6, https://swbplus.bsz-bw.de/bsz370651626cov.jpg, https://zbmath.org/?q=an:1250.94008, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm
work_keys_str_mv AT smithadam informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings