Information Theoretic Security

10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Theoretic Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319720890
Publisher: Springer International Publishing Publication: November 25, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319720890
Publisher: Springer International Publishing
Publication: November 25, 2017
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.

The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.

The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

More books from Springer International Publishing

Cover of the book Methodologies in Peace Psychology by
Cover of the book The Science of Interest by
Cover of the book Artificial Neural Networks and Machine Learning – ICANN 2018 by
Cover of the book Database and Expert Systems Applications by
Cover of the book Quantitative Ultrasound and Photoacoustic Imaging for the Assessment of Vascular Parameters by
Cover of the book Fostering Creativity and Innovation by
Cover of the book Learning Technology for Education in Cloud by
Cover of the book Mechanics of Biological Systems, Materials and other topics in Experimental and Applied Mechanics, Volume 4 by
Cover of the book The Milan System for Reporting Salivary Gland Cytopathology by
Cover of the book Fluvial Depositional Systems by
Cover of the book Multimodal Analyses enabling Artificial Agents in Human-Machine Interaction by
Cover of the book Adsorption, Aggregation and Structure Formation in Systems of Charged Particles by
Cover of the book Geoethics In Latin America by
Cover of the book Sociology at the London School of Economics and Political Science, 1904–2015 by
Cover of the book The Transitory Nature of Parent, Sibling and Romantic Partner Relationships in Emerging Adulthood by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy