LEADER 04980nam 22008895 450 001 996205184803316 005 20200630090632.0 010 $a3-319-04268-8 024 7 $a10.1007/978-3-319-04268-8 035 $a(CKB)3710000000085788 035 $a(DE-He213)978-3-319-04268-8 035 $a(SSID)ssj0001187250 035 $a(PQKBManifestationID)11675253 035 $a(PQKBTitleCode)TC0001187250 035 $a(PQKBWorkID)11243357 035 $a(PQKB)10893834 035 $a(MiAaPQ)EBC3101257 035 $a(PPN)176109226 035 $a(EXLCZ)993710000000085788 100 $a20140122d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Theoretic Security$b[electronic resource] $e7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings /$fedited by Carles Padró 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 259 p. 29 illus.) 225 1 $aSecurity and Cryptology ;$v8317 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-04267-X 320 $aIncludes bibliographical references and index. 327 $aHow to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage. 330 $aThis book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security. 410 0$aSecurity and Cryptology ;$v8317 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aE-commerce 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aKongress$zSingapur$y2013. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aE-commerce. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$ae-Commerce/e-business. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aPadró$b Carles$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICITS (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996205184803316 996 $aInformation Theoretic Security$9773803 997 $aUNISA