|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466422703316 |
|
|
Titolo |
Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 235 p. 31 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10681 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Coding theory |
Information theory |
Computer communication systems |
Software engineering |
Mathematical statistics |
Optical data processing |
Systems and Data Security |
Coding and Information Theory |
Computer Communication Networks |
Software Engineering |
Probability and Statistics in Computer Science |
Image Processing and Computer Vision |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes;Â multiparty computations; information theoretic reductions; and implementation challenges. |
|
|
|
|
|
|
|
| |