Vai al contenuto principale della pagina

Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Edizione: 1st ed. 2017.
Descrizione fisica: 1 online resource (XII, 235 p. 31 illus.)
Disciplina: 005.8
Soggetto topico: Computer security
Coding theory
Information theory
Computer communication systems
Software engineering
Mathematical statistics
Optical data processing
Systems and Data Security
Coding and Information Theory
Computer Communication Networks
Software Engineering
Probability and Statistics in Computer Science
Image Processing and Computer Vision
Persona (resp. second.): ShikataJunji
Nota di contenuto: Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.
Sommario/riassunto: This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
Titolo autorizzato: Information Theoretic Security  Visualizza cluster
ISBN: 3-319-72089-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996466422703316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 10681