product
2924321Information Theoretic Securityhttps://www.gandhi.com.mx/information-theoretic-security-9783319042688/phttps://gandhi.vtexassets.com/arquivos/ids/2247479/46000eab-1e43-4887-a728-4e77c545fb19.jpg?v=6383837124990700009621069MXNSpringer International PublishingInStock/Ebooks/<p>This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.</p>...2860309Information Theoretic Security9621069https://www.gandhi.com.mx/information-theoretic-security-9783319042688/phttps://gandhi.vtexassets.com/arquivos/ids/2247479/46000eab-1e43-4887-a728-4e77c545fb19.jpg?v=638383712499070000InStockMXN99999DIEbook20149783319042688_W3siaWQiOiJjYWU4MGM0MS05ZTVkLTRkOTYtODA1MC1iMmQ2ODIyYzIwZDgiLCJsaXN0UHJpY2UiOjEwMzcsImRpc2NvdW50IjoxMDMsInNlbGxpbmdQcmljZSI6OTM0LCJpbmNsdWRlc1RheCI6dHJ1ZSwicHJpY2VUeXBlIjoiV2hvbGVzYWxlIiwiY3VycmVuY3kiOiJNWE4iLCJmcm9tIjoiMjAyNC0xMS0xNlQwMDowMDowMFoiLCJ0byI6IjIwMjQtMTEtMzBUMjM6NTk6NTlaIiwicmVnaW9uIjoiTVgiLCJpc1ByZW9yZGVyIjpmYWxzZX0seyJpZCI6IjhmYzc1OGM3LWZjN2MtNDJiMC04MzAwLThiNmJhZWNiNGQzZiIsImxpc3RQcmljZSI6MTA3OSwiZGlzY291bnQiOjEwOCwic2VsbGluZ1ByaWNlIjo5NzEsImluY2x1ZGVzVGF4Ijp0cnVlLCJwcmljZVR5cGUiOiJXaG9sZXNhbGUiLCJjdXJyZW5jeSI6Ik1YTiIsImZyb20iOiIyMDI0LTEyLTAxVDAwOjAwOjAwWiIsInJlZ2lvbiI6Ik1YIiwiaXNQcmVvcmRlciI6ZmFsc2V9XQ==9783319042688_<p>This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.</p>...9783319042688_Springer International Publishinglibro_electonico_d195628d-167e-3e46-9337-0a716baf36ef_9783319042688;9783319042688_9783319042688InglésMéxico2014-01-22T00:00:00+00:00Springer International Publishing