Cantitate/Preț
Produs

Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings: Lecture Notes in Computer Science, cartea 7412

Editat de Adam Smith
en Limba Engleză Paperback – 3 iul 2012
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 40476 lei

Preț vechi: 50595 lei
-20% Nou

Puncte Express: 607

Preț estimativ în valută:
7753 8405$ 6445£

Carte tipărită la comandă

Livrare economică 02-16 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642322839
ISBN-10: 3642322832
Pagini: 230
Ilustrații: XI, 219 p. 28 illus.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.36 kg
Ediția:2012
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Caracteristici

Up-to-date results Fast-track conference proceedings State-of-the-art research