Skip to main content
  • Conference proceedings
  • © 2008

Information Theoretic Security

Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5155)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Quantum Information and Communication

    1. Interactive Hashing: An Information Theoretic Tool (Invited Talk)

      • Claude Crépeau, Joe Kilian, George Savvides
      Pages 14-28
  3. Networks and Devices

    1. Strong Secrecy for Wireless Channels (Invited Talk)

      • João Barros, Matthieu Bloch
      Pages 40-53
    2. Efficient Key Predistribution for Grid-Based Wireless Sensor Networks

      • Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
      Pages 54-69
    3. Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)

      • François-Xavier Standaert, Tal G. Malkin, Moti Yung
      Pages 70-70
  4. Mulitparty Computation

    1. Statistical Security Conditions for Two-Party Secure Function Evaluation

      • Claude Crépeau, Jürg Wullschleger
      Pages 86-99
  5. Information Hiding and Tracing

  6. Coding Theory and Security

    1. Oblivious Transfer Based on the McEliece Assumptions

      • Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
      Pages 107-117
  7. Quantum Computation

    1. Susceptible Two-Party Quantum Computations

      • Andreas Jakoby, Maciej LiÅ›kiewicz, Aleksander MÄ…dry
      Pages 121-136
  8. Secure and Reliable Communication II

    1. Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary

      • Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan
      Pages 137-155
    2. Key Refreshing in Wireless Sensor Networks

      • Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
      Pages 156-170
    3. Efficient Traitor Tracing from Collusion Secure Codes

      • Olivier Billet, Duong Hieu Phan
      Pages 171-182
  9. Foundation

    1. Revisiting the Karnin, Greene and Hellman Bounds

      • Yvo Desmedt, Brian King, Berry Schoenmakers
      Pages 183-198

Other Volumes

  1. Information Theoretic Security

About this book

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access