Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. proceedings /

<p>This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. </p><p>The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addi...

Полное описание

Сохранить в:
Библиографические подробности
Соавтор: SpringerLink (Online service)
Другие авторы: Smith, Adam
Формат: eКнига
Язык:English
Опубликовано: Berlin, Heidelberg Imprint: Springer 2012.
Серии:Lecture Notes in Computer Science, 7412
Предметы:
Online-ссылка:Click here to view the full text content
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
LEADER 02559nam a2200409 i 4500
001 vtls000106045
003 MY-ArUMP
005 20210731152135.0
007 cr nn 008mamaa
008 121130s2012 gw | fs |||| 0|eng d
020 |a 9783642322846  |9 978-3-642-32284-6 
039 9 |a 201304221142  |b SMI  |c 201211302334  |d NY  |y 201211141240  |z SMR 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Information theoretic security  |b 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. proceedings /  |c edited by Adam Smith. 
264 1 |a Berlin, Heidelberg  |b Imprint: Springer  |c 2012. 
300 |a xi, 219 p. 28 illus.  |b digital. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 0 |a Lecture Notes in Computer Science,  |x 0302-9743  |v 7412 
520 |a <p>This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. </p><p>The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.</p> 
650 0 |a Computer science. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Information Systems. 
700 |a Smith, Adam. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642322839 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743  |v 7412 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32284-6  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |f 1  |x 9 
999 |c 49228  |d 49228 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 44863  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |t 1  |w 2021-07-31  |y BK-EBOOK