


default search action
7th ICITS 2013: Singapore
- Carles Padró:
Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings. Lecture Notes in Computer Science 8317, Springer 2014, ISBN 978-3-319-04267-1 - Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta:
How to Construct Strongly Secure Network Coding Scheme. 1-17 - Paolo D'Arco, Roberto De Prisco
:
Secure Two-Party Computation: A Visual Way. 18-38 - Paolo D'Arco, Roberto De Prisco
, Alfredo De Santis
:
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. 39-55 - Teng Guo, Feng Liu, Chuan Kun Wu, YaWei Ren, Wen Wang:
On (k, n) Visual Cryptography Scheme with t Essential Parties. 56-68 - Iordanis Kerenidis, Mathieu Laurière, David Xiao:
New Lower Bounds for Privacy in Communication Protocols. 69-89 - Maksym A. Girnyk
, Frederic Gabry, Mikko Vehkaperä
, Lars K. Rasmussen, Mikael Skoglund:
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis. 90-102 - Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies. 103-121 - Matthew McKague
, Lana Sheridan:
Insider-Proof Encryption with Applications for Quantum Key Distribution. 122-141 - Ivan Damgård, Jakob Funder, Jesper Buus Nielsen
, Louis Salvail:
Superposition Attacks on Cryptographic Protocols. 142-161 - Yanqing Yao, Zhoujun Li:
Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy. 162-178 - Maciej Skorski
:
Modulus Computational Entropy. 179-199 - Juan A. Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov:
Broadcast (and Round) Efficient Verifiable Secret Sharing. 200-219 - Michal Jastrzebski, Stefan Dziembowski:
Leakage Resilience of the Blom's Key Distribution Scheme. 220-237 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Detection of Algebraic Manipulation in the Presence of Leakage. 238-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.