


default search action
9th ICITS 2016: Tacoma, WA, USA
- Anderson C. A. Nascimento, Paulo S. L. M. Barreto:

Information Theoretic Security - 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10015, 2016, ISBN 978-3-319-49174-5
Secret Sharing
- Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy

, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. 3-23 - Giulia Traverso, Denise Demirel, Johannes Buchmann:

Dynamic and Verifiable Hierarchical Secret Sharing. 24-43
Quantum Cryptography
- Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner

, Michael St. Jules:
Computational Security of Quantum Encryption. 47-71 - Anne Broadbent, Evelyn Wainewright:

Efficient Simulation for Quantum Message Authentication. 72-91
Visual Cryptography
- Paolo D'Arco, Roberto De Prisco

, Yvo Desmedt:
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography. 95-113 - Koray Karabina, Angela Robinson:

Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes. 114-125
Cryptographic Protocols
- Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:

Detecting Algebraic Manipulation in Leaky Storage Systems. 129-150 - Gabriele Spini, Serge Fehr:

Cheater Detection in SPDZ Multiparty Computation. 151-176 - Kenji Yasunaga:

Error-Correcting Codes Against Chosen-Codeword Attacks. 177-189 - Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias:

Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract). 190-212 - Yohei Watanabe, Goichiro Hanaoka

, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. 213-237
Entropy, Extractors and Privacy
- Vladimir P. Parente, Jeroen van de Graaf:

A Practical Fuzzy Extractor for Continuous Features. 241-258 - Shahab Asoodeh, Fady Alajaji, Tamás Linder:

Almost Perfect Privacy for Additive Gaussian Privacy Filters. 259-278 - Maciej Skórski

:
A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage. 279-299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














