000697318 000__ 03581cam\a2200541Mi\4500 000697318 001__ 697318 000697318 005__ 20230306135732.0 000697318 006__ m\\\\\o\\d\\\\\\\\ 000697318 007__ cr\un\nnnunnun 000697318 008__ 140317t20142014gw\a\\\\ob\\\\101\0\eng\d 000697318 020__ $$a9783319042688$$qelectronic book 000697318 020__ $$a3319042688$$qelectronic book 000697318 020__ $$z9783319042671 000697318 020__ $$z331904267X 000697318 035__ $$aSP(OCoLC)ocn873552064 000697318 035__ $$aSP(OCoLC)873552064 000697318 040__ $$aNLGGC$$beng$$erda$$epn$$cNLGGC$$dOCLCO$$dGZM$$dGW5XE$$dCOO 000697318 049__ $$aISEA 000697318 050_4 $$aQA76.9.A25 000697318 08204 $$a005.8$$223 000697318 1112_ $$aICITS (Conference)$$n(7th :$$d2013 :$$cSingapore) 000697318 24510 $$aInformation theoretic security$$h[electronic resource] :$$b7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings /$$cCarles Padró (ed.). 000697318 264_1 $$aCham :$$bSpringer,$$c[2014] 000697318 264_4 $$c©2014 000697318 300__ $$a1 online resource (xii, 259 pages) :$$billustrations. 000697318 336__ $$atext$$btxt$$2rdacontent 000697318 337__ $$acomputer$$bc$$2rdamedia 000697318 338__ $$aonline resource$$bcr$$2rdacarrier 000697318 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v8317. 000697318 4901_ $$aLNCS sublibrary. SL4, Security and cryptology 000697318 504__ $$aIncludes bibliographic references and index. 000697318 5050_ $$aHow to Construct Strongly Secure Network Coding Scheme -- Secure two-party computation: a visual way -- Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes -- On (k; n) visual cryptography scheme with t essential parties -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable Secret Sharing -- Leakage Resilience of the Blom's Key Distribution Scheme -- Detection of Algebraic Manipulation in the Presence of Leakage. 000697318 506__ $$aAccess limited to authorized users. 000697318 5200_ $$aThis book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security. 000697318 650_0 $$aData encryption (Computer science)$$vCongresses. 000697318 650_0 $$aComputer security$$vCongresses. 000697318 650_0 $$aData protection$$vCongresses. 000697318 650_0 $$aComputer science. 000697318 650_0 $$aData protection. 000697318 650_0 $$aData encryption (Computer science) 000697318 650_0 $$aCoding theory. 000697318 7001_ $$aPadró, Carles.$$eeditor. 000697318 830_0 $$aLecture notes in computer science ;$$v8317. 000697318 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000697318 85280 $$bebk$$hSpringerLink 000697318 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-04268-8$$zOnline Access 000697318 909CO $$ooai:library.usi.edu:697318$$pGLOBAL_SET 000697318 980__ $$aEBOOK 000697318 980__ $$aBIB 000697318 982__ $$aEbook 000697318 983__ $$aOnline 000697318 994__ $$a92$$bISE