Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icits/icits2008.bht:"
@inproceedings{DBLP:conf/icits/Araki08, author = {Toshinori Araki}, editor = {Reihaneh Safavi{-}Naini}, title = {Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {2--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_2}, doi = {10.1007/978-3-540-85093-9\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Araki08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BaigneresV08, author = {Thomas Baign{\`{e}}res and Serge Vaudenay}, editor = {Reihaneh Safavi{-}Naini}, title = {The Complexity of Distinguishing Distributions (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {210--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_20}, doi = {10.1007/978-3-540-85093-9\_20}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BaigneresV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BarrosB08, author = {Jo{\~{a}}o Barros and Matthieu R. Bloch}, editor = {Reihaneh Safavi{-}Naini}, title = {Strong Secrecy for Wireless Channels (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {40--53}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_5}, doi = {10.1007/978-3-540-85093-9\_5}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BarrosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BealsS08, author = {Travis R. Beals and Barry C. Sanders}, editor = {Reihaneh Safavi{-}Naini}, title = {Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {29--39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_4}, doi = {10.1007/978-3-540-85093-9\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BealsS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BilletP08, author = {Olivier Billet and Duong Hieu Phan}, editor = {Reihaneh Safavi{-}Naini}, title = {Efficient Traitor Tracing from Collusion Secure Codes}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {171--182}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_17}, doi = {10.1007/978-3-540-85093-9\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BilletP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlackburnEMP08, author = {Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson}, editor = {Reihaneh Safavi{-}Naini}, title = {Efficient Key Predistribution for Grid-Based Wireless Sensor Networks}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {54--69}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_6}, doi = {10.1007/978-3-540-85093-9\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/BlackburnEMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlackburnMPS08, author = {Simon R. Blackburn and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, editor = {Reihaneh Safavi{-}Naini}, title = {Key Refreshing in Wireless Sensor Networks}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {156--170}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_16}, doi = {10.1007/978-3-540-85093-9\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/BlackburnMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlierT08, author = {Hugue Blier and Alain Tapp}, editor = {Reihaneh Safavi{-}Naini}, title = {A Single Initialization Server for Multi-party Cryptography}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_8}, doi = {10.1007/978-3-540-85093-9\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BlierT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudharyPASR08, author = {Ashish Choudhary and Arpita Patra and B. V. Ashwinkumar and K. Srinathan and C. Pandu Rangan}, editor = {Reihaneh Safavi{-}Naini}, title = {Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {137--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_15}, doi = {10.1007/978-3-540-85093-9\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Collins08, author = {Michael J. Collins}, editor = {Reihaneh Safavi{-}Naini}, title = {Upper Bounds for Set Systems with the Identifiable Parent Property}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {100--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_10}, doi = {10.1007/978-3-540-85093-9\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Collins08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauKS08, author = {Claude Cr{\'{e}}peau and Joe Kilian and George Savvides}, editor = {Reihaneh Safavi{-}Naini}, title = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {14--28}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_3}, doi = {10.1007/978-3-540-85093-9\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauW08, author = {Claude Cr{\'{e}}peau and J{\"{u}}rg Wullschleger}, editor = {Reihaneh Safavi{-}Naini}, title = {Statistical Security Conditions for Two-Party Secure Function Evaluation}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {86--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_9}, doi = {10.1007/978-3-540-85093-9\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DesmedtKS08, author = {Yvo Desmedt and Brian King and Berry Schoenmakers}, editor = {Reihaneh Safavi{-}Naini}, title = {Revisiting the Karnin, Greene and Hellman Bounds}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {183--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_18}, doi = {10.1007/978-3-540-85093-9\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DowsleyGMN08, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Reihaneh Safavi{-}Naini}, title = {Oblivious Transfer Based on the McEliece Assumptions}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {107--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_11}, doi = {10.1007/978-3-540-85093-9\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Garay08, author = {Juan A. Garay}, editor = {Reihaneh Safavi{-}Naini}, title = {Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {1}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_1}, doi = {10.1007/978-3-540-85093-9\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Garay08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Guruswami08, author = {Venkatesan Guruswami}, editor = {Reihaneh Safavi{-}Naini}, title = {List Error-Correction with Optimal Information Rate (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {118--119}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_12}, doi = {10.1007/978-3-540-85093-9\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Guruswami08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Hanaoka08, author = {Goichiro Hanaoka}, editor = {Reihaneh Safavi{-}Naini}, title = {Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {223--231}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_21}, doi = {10.1007/978-3-540-85093-9\_21}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Hanaoka08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/JakobyLM08, author = {Andreas Jakoby and Maciej Liskiewicz and Aleksander Madry}, editor = {Reihaneh Safavi{-}Naini}, title = {Susceptible Two-Party Quantum Computations}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {121--136}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_14}, doi = {10.1007/978-3-540-85093-9\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/JakobyLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaK08, author = {Kaoru Kurosawa and Takeshi Koshiba}, editor = {Reihaneh Safavi{-}Naini}, title = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without Privacy Amplification}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {199--209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_19}, doi = {10.1007/978-3-540-85093-9\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/KurosawaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Lutkenhaus08, author = {Norbert L{\"{u}}tkenhaus}, editor = {Reihaneh Safavi{-}Naini}, title = {Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_13}, doi = {10.1007/978-3-540-85093-9\_13}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Lutkenhaus08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Patarin08, author = {Jacques Patarin}, editor = {Reihaneh Safavi{-}Naini}, title = {A Proof of Security in O(2n) for the Xor of Two Random Permutations}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {232--248}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_22}, doi = {10.1007/978-3-540-85093-9\_22}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Patarin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/StandaertMY08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Reihaneh Safavi{-}Naini}, title = {Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_7}, doi = {10.1007/978-3-540-85093-9\_7}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/StandaertMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2008, editor = {Reihaneh Safavi{-}Naini}, title = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9}, doi = {10.1007/978-3-540-85093-9}, isbn = {978-3-540-85092-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.