Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2014 (1)

Listing 1 - 1 of 1
Sort by

Book
Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
Authors: ---
ISBN: 331904267X 3319042688 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Keywords

Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- e-Commerce/e-business. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encryption (Computer science) --- Computer networks --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer security. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Codierungstheorie. --- Informationsloses Beweissystem. --- Informationstheorie. --- Kryptologie. --- Kryptosystem. --- Mehrparteienprotokoll. --- Secret-Sharing. --- Secret sharing --- Betrügererkennung --- Kryptologie --- Multiparty protocol --- Kommunikationsprotokoll --- Kryptographisches System --- Verschlüsselungssystem --- Chiffriersystem --- Chiffrierung --- Paarungsbasierte Kryptografie --- Geheimcodetechnik --- Kryptografie --- Kryptographie --- Datenverschlüsselung --- Steganographie --- Kryptologe --- Nachrichtentheorie --- Kybernetik --- Zero-knowledge proof system --- Zero-Knowledge-Beweis --- Kenntnisfreier Beweis --- Zero-Knowledge-Protokoll --- Interaktives Beweissystem --- Codierung --- Theorie --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Cryptography --- Protection --- Betrügererkennung --- Geheimschlüssel --- Datenverschlüsselung --- Information theory. --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication theory --- Communication --- Cybernetics --- Communication systems

Listing 1 - 1 of 1
Sort by