Advertisement

© 2016

Information Theoretic Security

9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers

  • Anderson C.A. Nascimento
  • Paulo Barreto
Conference proceedings ICITS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10015)

Also part of the Security and Cryptology book sub series (LNSC, volume 10015)

Table of contents

  1. Front Matter
    Pages I-VIII
  2. Secret Sharing

    1. Front Matter
      Pages 1-1
    2. Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
      Pages 3-23
    3. Giulia Traverso, Denise Demirel, Johannes Buchmann
      Pages 24-43
  3. Quantum Cryptography

    1. Front Matter
      Pages 45-45
    2. Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
      Pages 47-71
    3. Anne Broadbent, Evelyn Wainewright
      Pages 72-91
  4. Visual Cryptography

    1. Front Matter
      Pages 93-93
    2. Paolo D’Arco, Roberto De Prisco, Yvo Desmedt
      Pages 95-113
  5. Cryptographic Protocols

    1. Front Matter
      Pages 127-127
    2. Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang
      Pages 129-150
    3. Gabriele Spini, Serge Fehr
      Pages 151-176
    4. Samuel Ranellucci, Alain Tapp, Rasmus Zakarias
      Pages 190-212
    5. Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
      Pages 213-237
  6. Entropy, Extractors and Privacy

    1. Front Matter
      Pages 239-239
    2. Vladimir P. Parente, Jeroen van de Graaf
      Pages 241-258
    3. Shahab Asoodeh, Fady Alajaji, Tamás Linder
      Pages 259-278

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.

Keywords

cloud computing cryptography formal methods and theory of security network security access control application security authentication data privacy database security distributed storage human and societal aspects of security and privacy intrusion/anomaly detection malware mitigation operating systems security security in hardware software security storage security systems security

Editors and affiliations

  • Anderson C.A. Nascimento
    • 1
  • Paulo Barreto
    • 2
  1. 1.University of Washington Tacoma TacomaUSA
  2. 2.University of Washington TacomaUSA

Bibliographic information

  • Book Title Information Theoretic Security
  • Book Subtitle 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers
  • Editors Anderson C.A. Nascimento
    Paulo Barreto
  • Series Title Lecture Notes in Computer Science
  • Series Abbreviated Title Lect.Notes Computer
  • DOI https://doi.org/10.1007/978-3-319-49175-2
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-49174-5
  • eBook ISBN 978-3-319-49175-2
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages VIII, 301
  • Number of Illustrations 28 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Cryptology
    Coding and Information Theory
    Computer Communication Networks
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace