LEADER 04314nam 22007695 450 001 996466422703316 005 20200705113201.0 010 $a3-319-72089-9 024 7 $a10.1007/978-3-319-72089-0 035 $a(CKB)4340000000223592 035 $a(DE-He213)978-3-319-72089-0 035 $a(MiAaPQ)EBC6287312 035 $a(MiAaPQ)EBC5590761 035 $a(Au-PeEL)EBL5590761 035 $a(OCoLC)1013931518 035 $a(PPN)221251855 035 $a(EXLCZ)994340000000223592 100 $a20171122d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Theoretic Security$b[electronic resource] $e10th International Conference, ICITS 2017, Hong Kong, China, November 29 ? December 2, 2017, Proceedings /$fedited by Junji Shikata 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 235 p. 31 illus.) 225 1 $aSecurity and Cryptology ;$v10681 311 $a3-319-72088-0 327 $aQuantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges. 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges. 410 0$aSecurity and Cryptology ;$v10681 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aComputer communication systems 606 $aSoftware engineering 606 $aMathematical statistics 606 $aOptical data processing 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aProbability and Statistics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17036 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aMathematical statistics. 615 0$aOptical data processing. 615 14$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aProbability and Statistics in Computer Science. 615 24$aImage Processing and Computer Vision. 676 $a005.8 702 $aShikata$b Junji$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466422703316 996 $aInformation Theoretic Security$9773803 997 $aUNISA