Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. proceedings /
<p>This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. </p><p>The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addi...
Uloženo v:
| Korporativní autor: | |
|---|---|
| Další autoři: | |
| Médium: | E-kniha |
| Jazyk: | English |
| Vydáno: |
Berlin, Heidelberg
Imprint: Springer
2012.
|
| Edice: | Lecture Notes in Computer Science,
7412 |
| Témata: | |
| On-line přístup: | Click here to view the full text content |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
|
| LEADER | 02559nam a2200409 i 4500 | ||
|---|---|---|---|
| 001 | vtls000106045 | ||
| 003 | MY-ArUMP | ||
| 005 | 20210731152135.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 121130s2012 gw | fs |||| 0|eng d | ||
| 020 | |a 9783642322846 |9 978-3-642-32284-6 | ||
| 039 | 9 | |a 201304221142 |b SMI |c 201211302334 |d NY |y 201211141240 |z SMR | |
| 040 | |a MYPMP |b eng |c MYPMP |e rda | ||
| 245 | 1 | 0 | |a Information theoretic security |b 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. proceedings / |c edited by Adam Smith. |
| 264 | 1 | |a Berlin, Heidelberg |b Imprint: Springer |c 2012. | |
| 300 | |a xi, 219 p. 28 illus. |b digital. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 0 | |a Lecture Notes in Computer Science, |x 0302-9743 |v 7412 | |
| 520 | |a <p>This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. </p><p>The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.</p> | ||
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Data encryption (Computer science). | |
| 650 | 0 | |a Coding theory. | |
| 650 | 0 | |a Information Systems. | |
| 700 | |a Smith, Adam. | ||
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783642322839 |
| 830 | 0 | |a Lecture Notes in Computer Science, |x 0302-9743 |v 7412 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-32284-6 |y Click here to view the full text content |
| 942 | |2 lcc |c BK-EBOOK | ||
| 949 | |a VIRTUAITEM |d 10011 |f 1 |x 9 | ||
| 999 | |c 49228 |d 49228 | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 44863 |a FSGM |b FSGM |d 2021-07-31 |l 0 |r 2021-07-31 |t 1 |w 2021-07-31 |y BK-EBOOK | ||