Go back
Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973(2010 Edition)
Authors:
Kaoru Kurosawa
Cover Type:Hardcover
Condition:Used
In Stock
Shipment time
Expected shipping within 2 DaysPopular items with books
Access to 30 Million+ solutions
Free ✝
Ask 50 Questions from expert
AI-Powered Answers
✝ 7 days-trial
Total Price:
$0
List Price: $66.66
Savings: $66.66(100%)
Solution Manual Includes
Access to 30 Million+ solutions
Ask 50 Questions from expert
AI-Powered Answers
24/7 Tutor Help
Detailed solutions for Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973
Price:
$9.99
/month
Book details
ISBN: 3642144950, 978-3642144950
Book publisher: Springer
Get your hands on the best-selling book Information Theoretic Security International Conference Icits 2009 Shizuoka Japan December 2009 Revised Selected Papers LNCS 5973 2010 Edition for free. Feed your curiosity and let your imagination soar with the best stories coming out to you without hefty price tags. Browse SolutionInn to discover a treasure trove of fiction and non-fiction books where every page leads the reader to an undiscovered world. Start your literary adventure right away and also enjoy free shipping of these complimentary books to your door.
Book Summary: ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security.
Customers also bought these books
Frequently Bought Together
Top Reviews for Books
Dee Clark
( 5 )
"Delivery was considerably fast, and the book I received was in a good condition."