Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Theoretic Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319042688
Publisher: Springer International Publishing Publication: January 22, 2014
Imprint: Springer Language: English
Author:
ISBN: 9783319042688
Publisher: Springer International Publishing
Publication: January 22, 2014
Imprint: Springer
Language: English

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

More books from Springer International Publishing

Cover of the book Universal Access in Human–Computer Interaction. Design and Development Approaches and Methods by
Cover of the book Brain-Machine Interface by
Cover of the book Search for Exotic Mono-jet Events by
Cover of the book The Political Economy of the Low-Carbon Transition by
Cover of the book The Effects of Financial Crises on the Binding Force of Contracts - Renegotiation, Rescission or Revision by
Cover of the book Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1 by
Cover of the book A First Introduction to the Finite Element Analysis Program MSC Marc/Mentat by
Cover of the book Bottom-Up Self-Organization in Supramolecular Soft Matter by
Cover of the book The Automobile Revolution by
Cover of the book RNA Metabolism in Mitochondria by
Cover of the book Ethnotheatre and Creative Methods for Teacher Leadership by
Cover of the book Antibiotics and Antibiotics Resistance Genes in Soils by
Cover of the book Advances in Intelligent Networking and Collaborative Systems by
Cover of the book Entrepreneurship, Innovation and Economic Crisis by
Cover of the book An Introduction to Relativistic Processes and the Standard Model of Electroweak Interactions by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy