Information theoretic security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised selected papers /
Information theoretic security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised selected papers /
ICITS 2016
Anderson C.A. Nascimento, Paulo Barreto (eds.).
- 1 online resource (viii, 301 pages) : illustrations
- Lecture Notes in Computer Science, 10015 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 10015. LNCS sublibrary. SL 4, Security and cryptology. .
Includes author index.
Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy.
This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.
9783319491752 331949175X 3319491741 9783319491745
10.1007/978-3-319-49175-2 doi
com.springer.onix.9783319491752 Springer Nature
GBB8M2662 bnb
019136148 Uk
Data encryption (Computer science)--Congresses.
Computer security--Congresses.
Data protection--Congresses.
Chiffrement (Informatique)--Congrès.
Sécurité informatique--Congrès.
Protection de l'information (Informatique)--Congrès.
Coding theory & cryptology.
Network hardware.
Computer security.
Computers--Security--General.
Computers--Information Theory.
Computers--Hardware--Network Hardware.
Computer security
Data encryption (Computer science)
Data protection
Conference papers and proceedings
QA76.9.A25
005.8
Includes author index.
Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy.
This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.
9783319491752 331949175X 3319491741 9783319491745
10.1007/978-3-319-49175-2 doi
com.springer.onix.9783319491752 Springer Nature
GBB8M2662 bnb
019136148 Uk
Data encryption (Computer science)--Congresses.
Computer security--Congresses.
Data protection--Congresses.
Chiffrement (Informatique)--Congrès.
Sécurité informatique--Congrès.
Protection de l'information (Informatique)--Congrès.
Coding theory & cryptology.
Network hardware.
Computer security.
Computers--Security--General.
Computers--Information Theory.
Computers--Hardware--Network Hardware.
Computer security
Data encryption (Computer science)
Data protection
Conference papers and proceedings
QA76.9.A25
005.8