<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cmm a22000004i 4500</leader>
  <controlfield tag="001">UP-99796217611134570</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20140220103850.0</controlfield>
  <controlfield tag="006">m    go  j        </controlfield>
  <controlfield tag="007">cr |n |||auu|a</controlfield>
  <controlfield tag="008">110505s2011    xx         u |      eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9783642207280 (eBook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">3642207286 (eBook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPD-00212406622</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DML</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="042" ind1=" " ind2=" ">
   <subfield code="a">DMLUC</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">QA 76.9 A25</subfield>
   <subfield code="b">I25 2011eb</subfield>
  </datafield>
  <datafield tag="111" ind1="2" ind2=" ">
   <subfield code="a">ICITS (Conference)</subfield>
   <subfield code="n">(5th</subfield>
   <subfield code="d">2011</subfield>
   <subfield code="c">Amsterdam, Netherlands)</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Information theoretic security</subfield>
   <subfield code="h">[electronic resource]</subfield>
   <subfield code="b">5th international conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, proceedings</subfield>
   <subfield code="c">Serge Fehr, ed.</subfield>
  </datafield>
  <datafield tag="246" ind1="3" ind2="0">
   <subfield code="a">ICITS 2011</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Berlin</subfield>
   <subfield code="b">Springer</subfield>
   <subfield code="c">c2011.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (x, 227 p.)</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
   <subfield code="a">Lecture notes in computer science</subfield>
   <subfield code="v">6673</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">IP-based subscription, access limited to within on-campus computer network.</subfield>
   <subfield code="c">Access via Electronic Resources of the UPD University Library Website.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011. The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.</subfield>
  </datafield>
  <datafield tag="533" ind1=" " ind2=" ">
   <subfield code="a">Electronic reproduction.</subfield>
   <subfield code="b">New York</subfield>
   <subfield code="c">Springerlink</subfield>
   <subfield code="d">2011.</subfield>
   <subfield code="n">Available via World Wide Web through SpringerLink.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Data encryption (Computer science)</subfield>
   <subfield code="v">Congresses.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Cryptography</subfield>
   <subfield code="v">Congresses.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Information theory</subfield>
   <subfield code="v">Congresses.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Fehr, Serge.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">SpringerLink (Online service).</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="z">Available for the University of the Philippines Diliman via SpringerLink. Click here to access</subfield>
   <subfield code="u">http://link.springer.com/book/10.1007/978-3-642-20728-0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
   <subfield code="z">(viewed 27 August 2014)</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="a">Monograph</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DMLR</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
