JUNE 2008 VOLUME 54 NUMBER 6 IETTAW (ISSN 0018-9448) SPECIAL ISSUE ON INFORMATION THEORETIC SECURITY H. Imai, G. Hanaoka, U. Maurer, and Y. Zheng Introduction to the Special Issue on Information Theoretic Security 2405 PAPERS Bounds for Unconditionally Secure Authentication Codes M. Naor, G. Segev, and A. Smith Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models 2408 R. Safavi-Naini and P. R. Wild Information Theoretic Bounds on Authentication Systems in Query Model 2426 Broadcast Channels I. Csiszár and P. Narayan Secrecy Capacities for Multiterminal Channel Models 2437 A. Khisti, A. Tchamkerten, and G. W. Wornell Secure Broadcasting Over Fading Channels 2453 Y. Liang, H. V. Poor, and S. Shamai (Shitz) Secure Communication Over Fading Channels 2470 R. Liu, I. Maric´, P. Spasojevic´, and R. D. Yates Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions 2493 D. R. Stinson and G. M. Zaverucha Some Improved Bounds for Secure Frameproof Codes and Related Separating Hash Families 2508 Secure Key Agreement M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin Wireless Information-Theoretic Security 2515 V. Yakovlev, V. Korzhik, and G. Morales-Luna Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization 2535 Secure Multiport Computation O. Kosut and L. Tong Distributed Source Coding in the Presence of Byzantine Sensors 2550 K. Kurosawa, W. Kishimoto, and T. Koshiba A Combinatorial Approach to Deriving LowerBounds for Perfectly Secure ObliviousTransfer Reductions 2566