skip to content
Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings Preview this item
ClosePreview this item
Checking...

Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings

Author: Anja Lehmann; Stefan Wolf
Publisher: Cham : Springer International Publishing, 2015.
Series: Lecture Notes in Computer Science, 9063.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Anja Lehmann; Stefan Wolf
ISBN: 9783319174693 331917469X 9783319174709 3319174703
OCLC Number: 908701631
Description: Online-Ressource.
Contents: Practical Sharing of Quantum Secrets over Untrusted Channels --
Generalizing Efficient Multiparty Computation --
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity --
On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits --
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy --
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation --
Metric Pseudoentropy: Characterizations, Transformations and Applications --
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy --
Gambling, Computational Information and Encryption Security --
Query-Complexity Amplification for Random Oracles --
The Chaining Lemma and Its Application --
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens --
Limited View Adversary Codes: Bounds, Constructions and Applications --
Locally Decodable Codes for Edit Distance --
The Multivariate Hidden Number Problem --
Lattice Point Enumeration on Block Reduced Bases --
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
Series Title: Lecture Notes in Computer Science, 9063.
Responsibility: edited by Anja Lehmann, Stefan Wolf.

Abstract:

This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015.The 17 full  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/908701631> # Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
   library:oclcnum "908701631" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2520561382#Place/cham> ; # Cham
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2520561382#Topic/data_protection> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/2520561382#Topic/data_encryption> ; # Data encryption
   schema:about <http://experiment.worldcat.org/entity/work/data/2520561382#Topic/computer_science> ; # Computer science
   schema:about <http://experiment.worldcat.org/entity/work/data/2520561382#Topic/coding_theory> ; # Coding theory
   schema:bookFormat schema:EBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/2520561382#Person/wolf_stefan> ; # Stefan Wolf
   schema:contributor <http://experiment.worldcat.org/entity/work/data/2520561382#Person/lehmann_anja> ; # Anja Lehmann
   schema:datePublished "2015" ;
   schema:description "This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics." ;
   schema:description "Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes." ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2520561382> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2520561382#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture Notes in Computer Science ;
   schema:name "Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings" ;
   schema:productID "908701631" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/908701631#PublicationEvent/cham_springer_international_publishing_2015> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/2520561382#Agent/springer_international_publishing> ; # Springer International Publishing
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA> ;
   schema:url <http://dx.doi.org/10.1007/978-3-319-17470-9> ;
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978559&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA> ;
   schema:url <http://swbplus.bsz-bw.de/bsz430177062cov.htm> ;
   schema:workExample <http://worldcat.org/isbn/9783319174693> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-319-17470-9> ;
   schema:workExample <http://worldcat.org/isbn/9783319174709> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/908701631> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2520561382#Agent/springer_international_publishing> # Springer International Publishing
    a bgn:Agent ;
   schema:name "Springer International Publishing" ;
    .

<http://experiment.worldcat.org/entity/work/data/2520561382#Person/lehmann_anja> # Anja Lehmann
    a schema:Person ;
   schema:familyName "Lehmann" ;
   schema:givenName "Anja" ;
   schema:name "Anja Lehmann" ;
    .

<http://experiment.worldcat.org/entity/work/data/2520561382#Person/wolf_stefan> # Stefan Wolf
    a schema:Person ;
   schema:familyName "Wolf" ;
   schema:givenName "Stefan" ;
   schema:name "Stefan Wolf" ;
    .

<http://experiment.worldcat.org/entity/work/data/2520561382#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/908701631> ; # Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://worldcat.org/isbn/9783319174693>
    a schema:ProductModel ;
   schema:isbn "331917469X" ;
   schema:isbn "9783319174693" ;
    .

<http://worldcat.org/isbn/9783319174709>
    a schema:ProductModel ;
   schema:isbn "3319174703" ;
   schema:isbn "9783319174709" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/908701631> ; # Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://www.worldcat.org/title/-/oclc/908701631>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/908701631> ; # Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
   schema:dateModified "2017-09-02" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.