Information Theoretic Security

Information Theoretic Security

Yvo Desmedt

66,61 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2009
ISBN:
9783642102295
66,61 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information T- ory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005,Japan). The General Chair of ICITS 2007,Javier Lopez, and the Organ- ing Committee were responsible for local organization, registration, etc. Modern unclassi?ed research on cryptography started with Shannon’s work on cryptography using information theory. Since then we have seen several - search topics studied, requiring information theoretical security, also called - conditional security. Examples are anonymity, authenticity, reliable and private networks, secure multi-party computation, traitor tracing, etc. Moreover, we have also seen that coding as well as other aspects of information theory have been used in the design of cryptographic schemes. In the last few years there have been plenty of conferences and workshopson specializedtopicsincryptography.ExamplesareCHES,FSE,PKCandTCC.In view ofthe multitude oftopics incryptographyrequiringinformationtheoretical security or using information theory, it is time to have a regular conference on this topic. This was ?rst realized by Prof. Imai (then at University of Tokyo, Japan), who organized the ?rst event in October 2005. The goal is to continue this event on a regular basis. Therewere26 paperssubmitted to ICITS2007,ofwhich onewaswithdrawn.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €

Otros libros del autor

  • Information Security
    Yvo Desmedt
    This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013.The 16 revised full papers presented together with 14short papers were carefully reviewed and selected from 70 submissions. Thepapers cover a wide range of topics in the area of cryptography andcr...
    Disponible

    65,61 €

  • Public Key Cryptography - PKC 2003
    Yvo Desmedt
    This book constitutes the refereed proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2003, held in Miami, Florida, USA in January 2003. The 26 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on Diffie-Hellman based ...
    Disponible

    65,83 €