Cantitate/Preț
Produs

Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings: Lecture Notes in Computer Science, cartea 10681

Editat de Junji Shikata
en Limba Engleză Paperback – 23 noi 2017
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.

The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32346 lei

Preț vechi: 40432 lei
-20% Nou

Puncte Express: 485

Preț estimativ în valută:
6190 6430$ 5142£

Carte tipărită la comandă

Livrare economică 01-15 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319720883
ISBN-10: 3319720880
Pagini: 236
Ilustrații: XII, 235 p. 31 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Quantum cryptography.- Quantum information theory.- Post-quantum cryptography (e.g. lattices and cryptography).- Physical layer security.- Wiretap channels.- Adversarial channel models.- Cryptography from noisy channels.- Bounded storage models.- Network coding security.- Biometric security.- Randomness extraction.- Key and message rates.- Secret sharing.- Authentication codes.- Multiparty computations.- Information theoretic reductions.- Implementation challenges.

Caracteristici

Includes supplementary material: sn.pub/extras