LEADER 04154nam 22008055 450 001 996465735403316 005 20200702165840.0 010 $a3-642-32284-0 024 7 $a10.1007/978-3-642-32284-6 035 $a(CKB)3400000000085760 035 $a(SSID)ssj0000746000 035 $a(PQKBManifestationID)11462830 035 $a(PQKBTitleCode)TC0000746000 035 $a(PQKBWorkID)10860181 035 $a(PQKB)10845322 035 $a(DE-He213)978-3-642-32284-6 035 $a(MiAaPQ)EBC3069962 035 $a(PPN)168321467 035 $a(EXLCZ)993400000000085760 100 $a20120801d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security$b[electronic resource] $e6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings /$fedited by Adam Smith 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XI, 219 p. 28 illus.) 225 1 $aSecurity and Cryptology ;$v7412 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-32283-2 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security. 410 0$aSecurity and Cryptology ;$v7412 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aE-commerce 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aE-commerce. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$ae-Commerce/e-business. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a005.8 702 $aSmith$b Adam$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICITS 2012 906 $aBOOK 912 $a996465735403316 996 $aInformation Theoretic Security$9773803 997 $aUNISA