My Account Log in

1 option

Information Theoretic Security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings / edited by Junji Shikata.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Shikata, Junji, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10681
Security and Cryptology ; 10681
Language:
English
Subjects (All):
Data protection.
Coding theory.
Information theory.
Computer networks.
Software engineering.
Computer science-Mathematics.
Mathematical statistics.
Computer vision.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Software Engineering.
Probability and Statistics in Computer Science.
Computer Vision.
Local Subjects:
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Software Engineering.
Probability and Statistics in Computer Science.
Computer Vision.
Physical Description:
1 online resource (XII, 235 pages) : 31 illustrations
Edition:
1st ed. 2017.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2017.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
Contents:
Quantum cryptography
Quantum information theory
Post-quantum cryptography (e.g. lattices and cryptography)
Physical layer security
Wiretap channels
Adversarial channel models
Cryptography from noisy channels
Bounded storage models
Network coding security
Biometric security
Randomness extraction
Key and message rates
Secret sharing
Authentication codes
Multiparty computations
Information theoretic reductions
Implementation challenges.
Other Format:
Printed edition:
ISBN:
978-3-319-72089-0
9783319720890
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account