Innovative Security Solutions for Information Technology and Communications
Springer International Publishing (Verlag)
978-3-319-69283-8 (ISBN)
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Faster Zero-Knowledge Protocols and Applications.- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.- Key-policy Attribute-based Encryption from Bilinear Maps.- Security of Pseudo-Random Number Generators with Input.- Securing the Foundations of Democracy.- Exploring Naccache-Stern Knapsack Encryption.- Proximity Assurances Based on Natural and Artificial Ambient Environments.- Challenges of Federating National Data Access Infrastructures.- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.- Evolution of the McEliece Public Key Encryption Scheme.- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.- Secretly Embedding Trapdoors into Contract Signing Protocols.- On A Key Exchange Protocol.
| Erscheinungsdatum | 12.12.2017 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 201 p. 35 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 335 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Access Control • Applications • authentication • Block Ciphers • computer programming • Computer Science • conference proceedings • cryptography • Embedded Systems • Encryption • Finite Element Method • Informatics • Integer Programming • Linear Programming • Lyapunov Methods • Network Security • Project Management • Public Key Cryptography • Regression Analysis • Research • security issues • Security model • Security Systems • Software engineering |
| ISBN-10 | 3-319-69283-6 / 3319692836 |
| ISBN-13 | 978-3-319-69283-8 / 9783319692838 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich