Advertisement

Information Theoretic Security

Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

  • Editors
  • Reihaneh Safavi-Naini

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5155)

Table of contents

  1. Front Matter
  2. Secure and Reliable Communication I

  3. Quantum Information and Communication

  4. Networks and Devices

    1. João Barros, Matthieu Bloch
      Pages 40-53
    2. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
      Pages 54-69
    3. François-Xavier Standaert, Tal G. Malkin, Moti Yung
      Pages 70-70
  5. Mulitparty Computation

  6. Information Hiding and Tracing

  7. Coding Theory and Security

    1. Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
      Pages 107-117
  8. Quantum Computation

    1. Andreas Jakoby, Maciej Liśkiewicz, Aleksander Mądry
      Pages 121-136
  9. Secure and Reliable Communication II

    1. Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan
      Pages 137-155
    2. Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
      Pages 156-170
    3. Olivier Billet, Duong Hieu Phan
      Pages 171-182
  10. Foundation

    1. Yvo Desmedt, Brian King, Berry Schoenmakers
      Pages 183-198
    2. Thomas Baignères, Serge Vaudenay
      Pages 210-222
  11. Encryption

  12. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.

The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.

Keywords

DES DoS attacks Information access control broadcast encryption coding theory communication complexity cryptanalysis cryptographic protocols cryptography digital signature fingerprinting intrusion detection security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85093-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85092-2
  • Online ISBN 978-3-540-85093-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace