04154nam 22008055 450 99646573540331620200702165840.03-642-32284-010.1007/978-3-642-32284-6(CKB)3400000000085760(SSID)ssj0000746000(PQKBManifestationID)11462830(PQKBTitleCode)TC0000746000(PQKBWorkID)10860181(PQKB)10845322(DE-He213)978-3-642-32284-6(MiAaPQ)EBC3069962(PPN)168321467(EXLCZ)99340000000008576020120801d2012 u| 0engurnn|008mamaatxtccrInformation Theoretic Security[electronic resource] 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings /edited by Adam Smith1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XI, 219 p. 28 illus.) Security and Cryptology ;7412Bibliographic Level Mode of Issuance: Monograph3-642-32283-2 Includes bibliographical references and author index.This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.Security and Cryptology ;7412Computer securityData encryption (Computer science)Coding theoryInformation theoryE-commerceManagement information systemsComputer scienceComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Data encryption (Computer science).Coding theory.Information theory.E-commerce.Management information systems.Computer science.Computers and civilization.Systems and Data Security.Cryptology.Coding and Information Theory.e-Commerce/e-business.Management of Computing and Information Systems.Computers and Society.005.8Smith Adamedthttp://id.loc.gov/vocabulary/relators/edtICITS 2012BOOK996465735403316Information Theoretic Security773803UNISA