BibTeX record conf/isit/BeiramiCDM15

download as .bib file

@inproceedings{DBLP:conf/isit/BeiramiCDM15,
  author       = {Ahmad Beirami and
                  A. Robert Calderbank and
                  Ken R. Duffy and
                  Muriel M{\'{e}}dard},
  title        = {Quantifying computational security subject to source constraints,
                  guesswork and inscrutability},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {2757--2761},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282958},
  doi          = {10.1109/ISIT.2015.7282958},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BeiramiCDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics