0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.) Loot Price: R1,469
Discovery Miles 14 690
Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings...

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.)

Reihaneh Safavi-Naini

Series: Lecture Notes in Computer Science, 5155

 (sign in to rate)
Loot Price R1,469 Discovery Miles 14 690 | Repayment Terms: R138 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Lecture Notes in Computer Science, 5155
Release date: July 2008
First published: 2008
Editors: Reihaneh Safavi-Naini
Dimensions: 235 x 155 x 14mm (L x W x T)
Format: Paperback
Pages: 249
Edition: 2008 ed.
ISBN-13: 978-3-540-85092-2
Categories: Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
LSN: 3-540-85092-9
Barcode: 9783540850922

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners