Go back

Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973(2010 Edition)

Authors:

Kaoru Kurosawa

Free information theoretic security  international conference icits 2009 shizuoka japan december  2009 revised
4 ratings
Cover Type:Hardcover
Condition:Used

In Stock

Shipment time

Expected shipping within 2 Days
Access to 30 Million+ solutions Free
Ask 50 Questions from expert AI-Powered Answers
7 days-trial

Total Price:

$0

List Price: $66.66 Savings: $66.66(100%)
Access to 30 Million+ solutions
Ask 50 Questions from expert AI-Powered Answers 24/7 Tutor Help Detailed solutions for Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973

Price:

$9.99

/month

Book details

ISBN: 3642144950, 978-3642144950

Book publisher: Springer

Get your hands on the best-selling book Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973 2010 Edition for free. Feed your curiosity and let your imagination soar with the best stories coming out to you without hefty price tags. Browse SolutionInn to discover a treasure trove of fiction and non-fiction books where every page leads the reader to an undiscovered world. Start your literary adventure right away and also enjoy free shipping of these complimentary books to your door.

Book Summary: ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security.