1.

Record Nr.

UNISA996465735403316

Titolo

Information Theoretic Security [[electronic resource] ] : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings / / edited by Adam Smith

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012

ISBN

3-642-32284-0

Edizione

[1st ed. 2012.]

Descrizione fisica

1 online resource (XI, 219 p. 28 illus.)

Collana

Security and Cryptology ; ; 7412

Disciplina

005.8

Soggetti

Computer security

Data encryption (Computer science)

Coding theory

Information theory

E-commerce

Management information systems

Computer science

Computers and civilization

Systems and Data Security

Cryptology

Coding and Information Theory

e-Commerce/e-business

Management of Computing and Information Systems

Computers and Society

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and author index.

Sommario/riassunto

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest



are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.