Advertisement

Information Theoretic Security

6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings

  • Adam Smith
Conference proceedings ICITS 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7412)

Table of contents

  1. Front Matter
  2. Mohsen Alimomeni, Reihaneh Safavi-Naini
    Pages 1-13
  3. Anne Broadbent, Stacey Jeffery, Samuel Ranellucci, Alain Tapp
    Pages 14-36
  4. Ran Canetti, Ben Riva, Guy N. Rothblum
    Pages 37-61
  5. Ronald Cramer, Ivan Damgård, Valerio Pastro
    Pages 62-79
  6. Bernardo Machado David, Anderson C. A. Nascimento, Jörn Müller-Quade
    Pages 80-99
  7. Yevgeniy Dodis
    Pages 100-110
  8. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
    Pages 111-128
  9. Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
    Pages 129-146
  10. Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
    Pages 147-166
  11. Maki Yoshida, Toru Fujiwara, Marc Fossorier
    Pages 187-204
  12. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.

The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Keywords

encryption information theory oblivious affine function evaluation privacy zero knowledge protocols

Editors and affiliations

  • Adam Smith
    • 1
  1. 1.Department of Computer Science and EngineeringPennsylvania State UniversityUniversity ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-32284-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32283-9
  • Online ISBN 978-3-642-32284-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering