Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers - Lecture Notes in Computer Science 5973 (Paperback)
  • Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers - Lecture Notes in Computer Science 5973 (Paperback)
zoom

Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers - Lecture Notes in Computer Science 5973 (Paperback)

(editor)
£53.99
Paperback 249 Pages / Published: 03/09/2010
  • Publisher out of stock

Currently unavailable to order

This product is currently unavailable.

  • This item has been added to your basket
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security.

Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
ISBN: 9783642144950
Number of pages: 249
Weight: 386 g
Dimensions: 234 x 155 x 15 mm

You may also be interested in...

Exploding Data
Added to basket
£20.00
Hardback
The Old Religion
Added to basket
£12.99
Hardback
Cyberphobia
Added to basket
£9.99
Paperback
The Truth Machine
Added to basket
DarkMarket
Added to basket
£10.99
Paperback
Surveillance Valley
Added to basket
£14.99
Paperback
Ghost in the Wires
Added to basket
Click Here to Kill Everybody
Added to basket
Hello World
Added to basket
£18.99
Hardback
Hacking For Dummies
Added to basket
£22.99
Paperback
The Perfect Weapon
Added to basket
Hello World
Added to basket
£18.99   £15.99
Hardback
The Cyber Effect
Added to basket
£10.99
Paperback
Breaking and Entering
Added to basket
Intercept
Added to basket
£8.99
Paperback

Reviews

Please sign in to write a review

Your review has been submitted successfully.