Advertisement

Information Theoretic Security

9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers

  • Anderson C.A. Nascimento
  • Paulo Barreto
Conference proceedings ICITS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10015)

Also part of the Security and Cryptology book sub series (LNSC, volume 10015)

Table of contents

  1. Front Matter
    Pages I-VIII
  2. Secret Sharing

    1. Front Matter
      Pages 1-1
    2. Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
      Pages 3-23
    3. Giulia Traverso, Denise Demirel, Johannes Buchmann
      Pages 24-43
  3. Quantum Cryptography

    1. Front Matter
      Pages 45-45
    2. Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
      Pages 47-71
    3. Anne Broadbent, Evelyn Wainewright
      Pages 72-91
  4. Visual Cryptography

    1. Front Matter
      Pages 93-93
    2. Paolo D’Arco, Roberto De Prisco, Yvo Desmedt
      Pages 95-113
  5. Cryptographic Protocols

    1. Front Matter
      Pages 127-127
    2. Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang
      Pages 129-150
    3. Gabriele Spini, Serge Fehr
      Pages 151-176
    4. Samuel Ranellucci, Alain Tapp, Rasmus Zakarias
      Pages 190-212
    5. Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
      Pages 213-237
  6. Entropy, Extractors and Privacy

    1. Front Matter
      Pages 239-239
    2. Vladimir P. Parente, Jeroen van de Graaf
      Pages 241-258
    3. Shahab Asoodeh, Fady Alajaji, Tamás Linder
      Pages 259-278
  7. Back Matter
    Pages 301-301

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.

Keywords

cloud computing cryptography formal methods and theory of security network security access control application security authentication data privacy database security distributed storage human and societal aspects of security and privacy intrusion/anomaly detection malware mitigation operating systems security security in hardware software security storage security systems security

Editors and affiliations

  • Anderson C.A. Nascimento
    • 1
  • Paulo Barreto
    • 2
  1. 1.University of Washington Tacoma TacomaUSA
  2. 2.University of Washington TacomaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-49175-2
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-49174-5
  • Online ISBN 978-3-319-49175-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering