Search dblp for Publications

export results for "toc:db/conf/icits/icits2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icits/Araki08,
  author       = {Toshinori Araki},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time
                  Message Decryption},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {2--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_2},
  doi          = {10.1007/978-3-540-85093-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Araki08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BaigneresV08,
  author       = {Thomas Baign{\`{e}}res and
                  Serge Vaudenay},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {The Complexity of Distinguishing Distributions (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_20},
  doi          = {10.1007/978-3-540-85093-9\_20},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BaigneresV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BarrosB08,
  author       = {Jo{\~{a}}o Barros and
                  Matthieu R. Bloch},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Strong Secrecy for Wireless Channels (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {40--53},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_5},
  doi          = {10.1007/978-3-540-85093-9\_5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BarrosB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BealsS08,
  author       = {Travis R. Beals and
                  Barry C. Sanders},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Distributed Relay Protocol for Probabilistic Information-Theoretic
                  Security in a Randomly-Compromised Network},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_4},
  doi          = {10.1007/978-3-540-85093-9\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BealsS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BilletP08,
  author       = {Olivier Billet and
                  Duong Hieu Phan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Efficient Traitor Tracing from Collusion Secure Codes},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_17},
  doi          = {10.1007/978-3-540-85093-9\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BilletP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlackburnEMP08,
  author       = {Simon R. Blackburn and
                  Tuvi Etzion and
                  Keith M. Martin and
                  Maura B. Paterson},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Efficient Key Predistribution for Grid-Based Wireless Sensor Networks},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {54--69},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_6},
  doi          = {10.1007/978-3-540-85093-9\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/BlackburnEMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlackburnMPS08,
  author       = {Simon R. Blackburn and
                  Keith M. Martin and
                  Maura B. Paterson and
                  Douglas R. Stinson},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Key Refreshing in Wireless Sensor Networks},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_16},
  doi          = {10.1007/978-3-540-85093-9\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/BlackburnMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlierT08,
  author       = {Hugue Blier and
                  Alain Tapp},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {A Single Initialization Server for Multi-party Cryptography},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_8},
  doi          = {10.1007/978-3-540-85093-9\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BlierT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudharyPASR08,
  author       = {Ashish Choudhary and
                  Arpita Patra and
                  B. V. Ashwinkumar and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Perfectly Reliable and Secure Communication Tolerating Static and
                  Mobile Mixed Adversary},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_15},
  doi          = {10.1007/978-3-540-85093-9\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Collins08,
  author       = {Michael J. Collins},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Upper Bounds for Set Systems with the Identifiable Parent Property},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {100--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_10},
  doi          = {10.1007/978-3-540-85093-9\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Collins08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauKS08,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian and
                  George Savvides},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_3},
  doi          = {10.1007/978-3-540-85093-9\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauW08,
  author       = {Claude Cr{\'{e}}peau and
                  J{\"{u}}rg Wullschleger},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Statistical Security Conditions for Two-Party Secure Function Evaluation},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_9},
  doi          = {10.1007/978-3-540-85093-9\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DesmedtKS08,
  author       = {Yvo Desmedt and
                  Brian King and
                  Berry Schoenmakers},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Revisiting the Karnin, Greene and Hellman Bounds},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_18},
  doi          = {10.1007/978-3-540-85093-9\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DowsleyGMN08,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Oblivious Transfer Based on the McEliece Assumptions},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_11},
  doi          = {10.1007/978-3-540-85093-9\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Garay08,
  author       = {Juan A. Garay},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Partially Connected Networks: Information Theoretically Secure Protocols
                  and Open Problems (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {1},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_1},
  doi          = {10.1007/978-3-540-85093-9\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Garay08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Guruswami08,
  author       = {Venkatesan Guruswami},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {List Error-Correction with Optimal Information Rate (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {118--119},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_12},
  doi          = {10.1007/978-3-540-85093-9\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Guruswami08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Hanaoka08,
  author       = {Goichiro Hanaoka},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Some Information Theoretic Arguments for Encryption: Non-malleability
                  and Chosen-Ciphertext Security (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {223--231},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_21},
  doi          = {10.1007/978-3-540-85093-9\_21},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Hanaoka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/JakobyLM08,
  author       = {Andreas Jakoby and
                  Maciej Liskiewicz and
                  Aleksander Madry},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Susceptible Two-Party Quantum Computations},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_14},
  doi          = {10.1007/978-3-540-85093-9\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/JakobyLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaK08,
  author       = {Kaoru Kurosawa and
                  Takeshi Koshiba},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without
                  Privacy Amplification},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_19},
  doi          = {10.1007/978-3-540-85093-9\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Lutkenhaus08,
  author       = {Norbert L{\"{u}}tkenhaus},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_13},
  doi          = {10.1007/978-3-540-85093-9\_13},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Lutkenhaus08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Patarin08,
  author       = {Jacques Patarin},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {A Proof of Security in O(2n) for the Xor of Two Random Permutations},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {232--248},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_22},
  doi          = {10.1007/978-3-540-85093-9\_22},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Patarin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/StandaertMY08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Does Physical Security of Cryptographic Devices Need a Formal Study?
                  (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_7},
  doi          = {10.1007/978-3-540-85093-9\_7},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/StandaertMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2008,
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9},
  doi          = {10.1007/978-3-540-85093-9},
  isbn         = {978-3-540-85092-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics