Information Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings /
Information Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / [electronic resource] :
edited by Junji Shikata.
- 1st ed. 2017.
- XII, 235 p. 31 illus. online resource.
- Security and Cryptology, 10681 2946-1863 ; .
- Security and Cryptology, 10681 .
Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
9783319720890
10.1007/978-3-319-72089-0 doi
Data protection.
Coding theory.
Information theory.
Computer networks .
Software engineering.
Computer science--Mathematics.
Mathematical statistics.
Computer vision.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Software Engineering.
Probability and Statistics in Computer Science.
Computer Vision.
QA76.9.A25
005.8
Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
9783319720890
10.1007/978-3-319-72089-0 doi
Data protection.
Coding theory.
Information theory.
Computer networks .
Software engineering.
Computer science--Mathematics.
Mathematical statistics.
Computer vision.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Software Engineering.
Probability and Statistics in Computer Science.
Computer Vision.
QA76.9.A25
005.8