Information Theoretic Security [[electronic resource] ] : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings / / edited by Carles Padró
| Information Theoretic Security [[electronic resource] ] : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings / / edited by Carles Padró |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XII, 259 p. 29 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory E-commerce Management information systems Computer science Computers and civilization Systems and Data Security Cryptology Coding and Information Theory e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
| Soggetto genere / forma | Kongress2013.Singapur |
| ISBN | 3-319-04268-8 |
| Classificazione |
DAT 465f
SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | How to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage. |
| Record Nr. | UNISA-996205184803316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings / / edited by Carles Padró
| Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings / / edited by Carles Padró |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XII, 259 p. 29 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Electronic commerce Management information systems Computer science Computers and civilization Systems and Data Security Cryptology Coding and Information Theory e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
| Soggetto genere / forma | Kongress2013.Singapur |
| ISBN | 3-319-04268-8 |
| Classificazione |
DAT 465f
SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | How to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage. |
| Record Nr. | UNINA-9910483089103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||