Information Theoretic Security
10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings
Seiten
2017
|
1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-72088-3 (ISBN)
Springer International Publishing (Verlag)
978-3-319-72088-3 (ISBN)
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.
The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
Quantum cryptography.- Quantum information theory.- Post-quantum cryptography (e.g. lattices and cryptography).- Physical layer security.- Wiretap channels.- Adversarial channel models.- Cryptography from noisy channels.- Bounded storage models.- Network coding security.- Biometric security.- Randomness extraction.- Key and message rates.- Secret sharing.- Authentication codes.- Multiparty computations.- Information theoretic reductions.- Implementation challenges.
| Erscheinungsdatum | 24.11.2017 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 235 p. 31 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 382 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Adversarial channel models • Authentication Codes • biometric security • Bounded storage models • Data Security • Information theoretic cryptography • information theoretic security • Multicasting • Multiparty Computations • Network Coding Security • Physical Layer Security • Quantum cryptograph • Secret Sharing • Software engineering • unconditional security • Unicast • wireless networks • wireless telecommunication systems |
| ISBN-10 | 3-319-72088-0 / 3319720880 |
| ISBN-13 | 978-3-319-72088-3 / 9783319720883 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95