skip to content
Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings Preview this item
ClosePreview this item
Checking...

Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings

Author: Junji Shikata
Publisher: Cham, Switzerland : Springer, 2017.
Series: Lecture notes in computer science, 10681.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography);  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Junji Shikata
ISBN: 9783319720890 3319720899
OCLC Number: 1013931518
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource (xii, 235 pages) : illustrations
Contents: Quantum cryptography --
Quantum information theory --
Post-quantum cryptography (e.g. lattices and cryptography) --
Physical layer security --
Wiretap channels --
Adversarial channel models --
Cryptography from noisy channels --
Bounded storage models --
Network coding security --
Biometric security --
Randomness extraction --
Key and message rates --
Secret sharing --
Authentication codes --
Multiparty computations --
Information theoretic reductions --
Implementation challenges.
Series Title: Lecture notes in computer science, 10681.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: ICITS 2017
Responsibility: Junji Shikata (ed.).

Abstract:

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.The 12 full  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1013931518> # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "1013931518" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/software_engineering> ; # Software Engineering
    schema:about <http://dewey.info/class/005.824/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_computer_graphics> ; # Computers--Computer Graphics
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/network_hardware> ; # Network hardware
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/coding_theory_&_cryptology> ; # Coding theory & cryptology
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/maths_for_computer_scientists> ; # Maths for computer scientists
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_security_general> ; # Computers--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/image_processing> ; # Image processing
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_hardware_network_hardware> ; # Computers--Hardware--Network Hardware
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_information_theory> ; # Computers--Information Theory
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_mathematical_&_statistical_software> ; # Computers--Mathematical & Statistical Software
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_software_development_&_engineering_general> ; # Computers--Software Development & Engineering--General
    schema:alternateName "ICITS 2017" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/4657130222#Meeting/icits_conference_10th_2017_hong_kong_china> ; # ICITS (Conference) (10th : 2017 : Hong Kong, China)
    schema:datePublished "2017" ;
    schema:description "This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges."@en ;
    schema:description "Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/4657130222#Person/shikata_junji> ; # Junji Shikata
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4657130222> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4657130222#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4657130222#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4657130222#CreativeWork/> ;
    schema:name "Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings"@en ;
    schema:productID "1013931518" ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783319720890> ;
    schema:url <https://doi.org/10.1007/978-3-319-72089-0> ;
    schema:url <http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2018-02-09/1/9783319720890> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5590761> ;
    schema:url <https://link.springer.com/book/10.1007/978-3-319-72089-0> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-72089-0> ;
    schema:workExample <http://worldcat.org/isbn/9783319720890> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB8O3500> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1013931518> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4657130222#Meeting/icits_conference_10th_2017_hong_kong_china> # ICITS (Conference) (10th : 2017 : Hong Kong, China)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/4657130222#Place/hong_kong_china> ; # Hong Kong, China)
    schema:name "ICITS (Conference) (10th : 2017 : Hong Kong, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Person/shikata_junji> # Junji Shikata
    a schema:Person ;
    schema:familyName "Shikata" ;
    schema:givenName "Junji" ;
    schema:name "Junji Shikata" ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Place/hong_kong_china> # Hong Kong, China)
    a schema:Place ;
    schema:name "Hong Kong, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1013931518> ; # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1013931518> ; # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/coding_theory_&_cryptology> # Coding theory & cryptology
    a schema:Intangible ;
    schema:name "Coding theory & cryptology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_computer_graphics> # Computers--Computer Graphics
    a schema:Intangible ;
    schema:name "Computers--Computer Graphics"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_hardware_network_hardware> # Computers--Hardware--Network Hardware
    a schema:Intangible ;
    schema:name "Computers--Hardware--Network Hardware"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_information_theory> # Computers--Information Theory
    a schema:Intangible ;
    schema:name "Computers--Information Theory"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_mathematical_&_statistical_software> # Computers--Mathematical & Statistical Software
    a schema:Intangible ;
    schema:name "Computers--Mathematical & Statistical Software"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_security_general> # Computers--Security--General
    a schema:Intangible ;
    schema:name "Computers--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/computers_software_development_&_engineering_general> # Computers--Software Development & Engineering--General
    a schema:Intangible ;
    schema:name "Computers--Software Development & Engineering--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/maths_for_computer_scientists> # Maths for computer scientists
    a schema:Intangible ;
    schema:name "Maths for computer scientists"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4657130222#Topic/software_engineering> # Software Engineering
    a schema:Intangible ;
    schema:name "Software Engineering"@en ;
    .

<http://worldcat.org/entity/work/data/4657130222#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1013931518> ; # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    .

<http://worldcat.org/isbn/9783319720890>
    a schema:ProductModel ;
    schema:isbn "3319720899" ;
    schema:isbn "9783319720890" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1013931518> ; # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/1013931518>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1013931518> ; # Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings
    schema:dateModified "2020-01-21" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.