{"_id":"HNRNDkkvHiR3Aeyxx","bibbaseid":"lehmann-wolf-informationtheoreticsecurity8thinternationalconferenceicits2015luganoswitzerlandmay252015proceedings-2015","downloads":0,"creationDate":"2017-01-23T12:51:14.424Z","title":"Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings","author_short":null,"year":2015,"bibtype":"proceedings","biburl":"http://dblp.org/pers/tb2/k/Kumar_0002:Ashutosh","bibdata":{"bibtype":"proceedings","type":"proceedings","editor":[{"firstnames":["Anja"],"propositions":[],"lastnames":["Lehmann"],"suffixes":[]},{"firstnames":["Stefan"],"propositions":[],"lastnames":["Wolf"],"suffixes":[]}],"title":"Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings","series":"Lecture Notes in Computer Science","volume":"9063","publisher":"Springer","year":"2015","url":"http://dx.doi.org/10.1007/978-3-319-17470-9","doi":"10.1007/978-3-319-17470-9","isbn":"978-3-319-17469-3","timestamp":"Tue, 07 Apr 2015 15:35:49 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/conf/icits/2015","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@proceedings{DBLP:conf/icits/2015,\n editor = {Anja Lehmann and\n Stefan Wolf},\n title = {Information Theoretic Security - 8th International Conference, {ICITS}\n 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {9063},\n publisher = {Springer},\n year = {2015},\n url = {http://dx.doi.org/10.1007/978-3-319-17470-9},\n doi = {10.1007/978-3-319-17470-9},\n isbn = {978-3-319-17469-3},\n timestamp = {Tue, 07 Apr 2015 15:35:49 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/conf/icits/2015},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","editor_short":["Lehmann, A.","Wolf, S."],"key":"DBLP:conf/icits/2015","id":"DBLP:conf/icits/2015","bibbaseid":"lehmann-wolf-informationtheoreticsecurity8thinternationalconferenceicits2015luganoswitzerlandmay252015proceedings-2015","role":"editor","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-319-17470-9"},"downloads":0},"search_terms":["information","theoretic","security","8th","international","conference","icits","2015","lugano","switzerland","2015","proceedings"],"keywords":[],"authorIDs":[],"dataSources":["csatHJMiA94Qn9BHP"]}