LEADER 03862nam 22007815 450 001 996465374903316 005 20200705184609.0 010 $a3-642-20728-6 024 7 $a10.1007/978-3-642-20728-0 035 $a(CKB)2670000000083930 035 $a(SSID)ssj0000530618 035 $a(PQKBManifestationID)11332942 035 $a(PQKBTitleCode)TC0000530618 035 $a(PQKBWorkID)10567880 035 $a(PQKB)11595384 035 $a(DE-He213)978-3-642-20728-0 035 $a(MiAaPQ)EBC3066711 035 $a(PPN)153868244 035 $a(EXLCZ)992670000000083930 100 $a20110505d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security$b[electronic resource] $e5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011, Proceedings /$fedited by Serge Fehr 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (X, 227 p.) 225 1 $aSecurity and Cryptology ;$v6673 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-20727-8 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011. The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones. 410 0$aSecurity and Cryptology ;$v6673 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a005.8 702 $aFehr$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICITS 2011 906 $aBOOK 912 $a996465374903316 996 $aInformation Theoretic Security$9773803 997 $aUNISA