Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Innovative Security Solutions for Information Technology and Communications -

Innovative Security Solutions for Information Technology and Communications

8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
Buch | Softcover
XXIV, 281 Seiten
2016 | 1st ed. 2015
Springer International Publishing (Verlag)
978-3-319-27178-1 (ISBN)
CHF 71,90 inkl. MwSt

This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015.

The 17 revised full papers were carefully reviewed andselected from 36 submissions. In addition with 5 invited talks the papers covertopics such as Cryptographic Algorithms and Protocols, Security Technologiesfor IT&C, Information Security Management, Cyber Defense, and DigitalForensics.

 

Authenticated-Encryption: Security Notions, Designs and Applications .- NewResults on Identity-based Encryption from Quadratic Residuosity.- Efficienttechniques for extracting secrets from electronic devices.- Secure and TrustedApplication Execution on Embedded Devices.- A Number-Theoretic Error-CorrectingCode.- Full duplex OTP cryptosystem based on DNA key for text transmissions.- Evaluationof Lightweight Block Ciphers for Embedded Systems.- SCA Resistance Analysis onFPGA Implementations of Sponge based MAC-PHOTON.- A Novel Fast and SecureChaos-Based Algorithm for Image Encryption.- A Novel Key Management forVirtually Limitless Key Size.- Efficient Montgomery Multiplication on GPUs.- ApplyingCryptographic Acceleration Techniques to Error Correction.- A Cooperative BlackHole Node Detection and Mitigation Approach for MANETs.- Up-high to Down-low:Applying Machine Learning to an Exploit Database.- Detecting Computers in theCyber Space Maliciously Exploited as SSH Proxies.-On a LightweightAuthentication Protocol for RFID.- Spam Filtering using Automated ClassifyingServices Over a Cloud Computing Infrastructure.- Contributions toSteganographic Techniques on Mobile Devices.- Secure implementation of Streamcipher: Trivium.- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXIV, 281 p. 88 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Applications • Cloud Computing • Computer Science • conference proceedings • cryptographic algorithms • cyberattack • Data Mining • decision trees • DNA cryptography • Embedded Systems • encrypted traffic • hardware security • Informatics • Lightweight cryptography • LSB Steganography • machine learning • mobile ad hoc networks • perceptual fingerprinting • provable security • Research • runtime security • secure encryption • Smart cards • SSH • systems and data security • trusted platform
ISBN-10 3-319-27178-4 / 3319271784
ISBN-13 978-3-319-27178-1 / 9783319271781
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95