Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings

Author:   Junji Shikata
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10681
ISBN:  

9783319720883


Pages:   235
Publication Date:   23 November 2017
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Full Product Details

Author:   Junji Shikata
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10681
Weight:   0.454kg
ISBN:  

9783319720883


ISBN 10:   3319720880
Pages:   235
Publication Date:   23 November 2017
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Quantum cryptography.- Quantum information theory.- Post-quantum cryptography (e.g. lattices and cryptography).- Physical layer security.- Wiretap channels.- Adversarial channel models.- Cryptography from noisy channels.- Bounded storage models.- Network coding security.- Biometric security.- Randomness extraction.- Key and message rates.- Secret sharing.- Authentication codes.- Multiparty computations.- Information theoretic reductions.- Implementation challenges.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List