The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITS"( http://dblp.L3S.de/Venues/ICITS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icits

Publication years (Num. hits)
2005 (20) 2007 (17) 2008 (23) 2009 (19) 2010-2011 (21) 2012-2013 (26) 2014-2015 (19) 2016 (15) 2017-2018 (124) 2019 (91) 2020 (70)
Publication types (Num. hits)
inproceedings(432) proceedings(13)
Venues (Conferences, Journals, ...)
ICITS(445)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 18 occurrences of 15 keywords

Results
Found 445 publication records. Showing 445 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Olivier Billet, Duong Hieu Phan Efficient Traitor Tracing from Collusion Secure Codes. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson Key Refreshing in Wireless Sensor Networks. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key refreshing, wireless sensor networks, forward security
1Goichiro Hanaoka Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Joe Kilian, George Savvides Interactive Hashing: An Information Theoretic Tool (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Jürg Wullschleger Statistical Security Conditions for Two-Party Secure Function Evaluation. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security definition, oblivious transfer, information-theoretic security, Secure function evaluation
1Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento Oblivious Transfer Based on the McEliece Assumptions. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Brian King, Berry Schoenmakers Revisiting the Karnin, Greene and Hellman Bounds. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Takeshi Koshiba Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deterministic randomness extractor, reduction, oblivious transfer, privacy amplification
1Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp Anonymous Quantum Communication - (Extended Abstract). Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Iordanis Kerenidis Introduction to Quantum Information Theory. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alexandre Pinto, André Souto, Armando Matos, Luis Antunes 0002 Commitment and Authentication Systems. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Junji Shikata Construction Methodology of Unconditionally Secure Signature Schemes. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano Improvement of Collusion Secure Convolutional Fingerprinting Information Codes. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Alfredo De Santis Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto Unconditionally Secure Blind Signatures. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Kazuhiro Suzuki Almost Secure (1-Round, n-Channel) Message Transmission Scheme. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Luis Antunes 0002, Sophie Laplante, Alexandre Pinto, Liliana C. M. Salvador Cryptographic Security of Individual Instances. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Renato Renner, Stefan Wolf 0001, Jürg Wullschleger Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Unconditionally Secure Chaffing-and-Winnowing for Multiple Use. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1K. Srinathan, C. Pandu Rangan, Ranjit Kumaresan On Exponential Lower Bound for Protocols for Reliable Communication in Networks. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shuhong Wang, Reihaneh Safavi-Naini New Results on Unconditionally Secure Multi-receiver Manual Authentication. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ueli Maurer Random Systems: Theory and Applications. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tord Ingolf Reistad, Tomas Toft Secret Sharing Comparison by Transformation and Rotation. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Emilia Käsper, Ventzislav Nikov, Svetla Nikova Strongly Multiplicative Hierarchical Threshold Secret Sharing. Search on Bibsonomy ICITS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto Relationship of three cryptographic channels in the UC framework. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka Unconditionally secure signatures and its related schemes. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, ICITS 2005, Awaji Island, Japan, October 16-19, 2005. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  BibTeX  RDF
1Yevgeniy Dodis On extractors, error-correction and hiding all partial information. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tsutomu Matsumoto, Junji Shikata Authenticated encryption and steganography in unconditional security setting. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Keith M. Martin Dynamic access policies for unconditionally secure secret sharing schemes. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa Some topics related to resilient functions. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Peter R. Wild Bounds on authentication systems in query model. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daisuke Kobayashi, Hirosuke Yamamoto, Tomohiro Ogawa How to attain the ordinary channel capacity securely in wiretap channels. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hiroki Koga Coding theorems on the threshold scheme for a general source. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Matthias Fitzi Broadcast and secure computation under reduced setup assumptions. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stefan Wolf 0001, Jürg Wullschleger Bit commitment from weak non-locality. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Carlo Blundo Randomness in self-healing key distribution schemes. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Unconditionally private and reliable communication in an untrusted network. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Anne Canteaut Fast correlation attacks against stream ciphers and related open problems. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jörn Müller-Quade Temporary assumptions - quantum and classical. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael O. Rabin Provably unbreakable hyper-encryption in the limited access model. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Moti Yung Cryptography and decoding Reed-Solomon codes as a hard problem. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gilles Brassard Brief history of quantum cryptography: a personal perspective. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ivan Bjerre Damgård, Serge Fehr, Louis Salvail, Christian Schaffner Cryptography in the bounded quantum-storage model. Search on Bibsonomy ICITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #445 of 445 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license