語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Theoretic Security = 8th...
~
Lehmann, Anja.
Information Theoretic Security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Theoretic Security/ edited by Anja Lehmann, Stefan Wolf.
其他題名:
8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
其他作者:
Lehmann, Anja.
面頁冊數:
XIV, 297 p. 29 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-17470-9
ISBN:
9783319174709
Information Theoretic Security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
Information Theoretic Security
8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /[electronic resource] :edited by Anja Lehmann, Stefan Wolf. - 1st ed. 2015. - XIV, 297 p. 29 illus.online resource. - Security and Cryptology ;9063. - Security and Cryptology ;9241.
Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics.
ISBN: 9783319174709
Standard No.: 10.1007/978-3-319-17470-9doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information Theoretic Security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
LDR
:03082nam a22004215i 4500
001
963191
003
DE-He213
005
20200705140039.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319174709
$9
978-3-319-17470-9
024
7
$a
10.1007/978-3-319-17470-9
$2
doi
035
$a
978-3-319-17470-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Information Theoretic Security
$h
[electronic resource] :
$b
8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
$c
edited by Anja Lehmann, Stefan Wolf.
250
$a
1st ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
XIV, 297 p. 29 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
9063
505
0
$a
Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
520
$a
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics.
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Coding and Information Theory.
$3
669784
700
1
$a
Lehmann, Anja.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1117300
700
1
$a
Wolf, Stefan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1258127
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319174716
776
0 8
$i
Printed edition:
$z
9783319174693
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-319-17470-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入