Information theoretic security : 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 ; proceedings (English)
- New search for: ICITS
- Further information on ICITS:
- http://d-nb.info/gnd/16156753-8
- New search for: Fehr, Serge
- New search for: ICITS
- Further information on ICITS:
- http://d-nb.info/gnd/16156753-8
2011
-
ISBN:
- Conference Proceedings / Print
-
Title:Information theoretic security : 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 ; proceedings
-
Contributors:Fehr, Serge ( editor ) / ICITS
-
Conference:ICITS ; 5 ; 2011 ; Amsterdam
International Conference on Information Theoretic Security ; 5 ; 2011 ; Amsterdam -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , Heidelberg [u.a.]
-
Publication date:2011
-
Size:X, 226 S.
-
Remarks:Ill., graph. Darst.
Literaturangaben
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
- New search for: *94-06 / 00B25 / 94A60
- Further information on Mathematics Subject Classification
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 54.38 / 53.71
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Correlation Extractors and Their Applications (Invited Talk)Ishai, Y. et al. | 2011
- 6
-
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and AuthenticityKawachi, A. / Portmann, C. / Tanaka, K. et al. | 2011
- 25
-
Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk)Applebaum, B. et al. | 2011
- 32
-
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed NetworksNayak, M. / Agrawal, S. / Srinathan, K. et al. | 2011
- 52
-
Quantum-Resilient Randomness Extraction (Invited Talk)Renner, R. et al. | 2011
- 58
-
Homogeneous Faults, Colored Edge Graphs, and Cover Free FamiliesWang, Y. / Desmedt, Y. et al. | 2011
- 73
-
On Information Theoretic Security: Mathematical Models and Techniques (Invited Talk)Csiszar, I. et al. | 2011
- 76
-
Common Randomness and Secret Key Capacities of Two-Way ChannelsAhmadi, H. / Safavi-Naini, R. et al. | 2011
- 94
-
LT-Codes and Phase Transitions for Mutual Information (Invited Talk)Shokrollahi, A. et al. | 2011
- 100
-
Unconditionally Secure Signature Schemes RevisitedSwanson, C.M. / Stinson, D.R. et al. | 2011
- 117
-
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? (Invited Talk)de Wolf, R. et al. | 2011
- 120
-
Efficient Reductions for Non-signaling Cryptographic PrimitivesDottling, N. / Kraschewski, D. / Muller-Quade, J. et al. | 2011
- 138
-
Some Notions of Entropy for Cryptography (Invited Talk)Reyzin, L. et al. | 2011
- 143
-
The Round Complexity of Perfectly Secure General VSSChoudhury, A. / Kurosawa, K. / Patra, A. et al. | 2011
- 163
-
Graceful Degradation in Multi-Party ComputationHirt, M. / Lucas, C. / Maurer, U. / Raub, D. et al. | 2011
- 181
-
Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)Damgard, I. et al. | 2011
- 182
-
Using Colors to Improve Visual Cryptography for Black and White ImagesDe Prisco, R. / De Santis, A. et al. | 2011
- 202
-
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption (Invited Talk)Barg, A. / Kabatiansky, G. et al. | 2011
- 206
-
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal ResiliencePatra, A. / Rangan, C.P. et al. | 2011