Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers / [electronic resource] :
edited by Pooya Farshim, Emil Simion.
- 1st ed. 2017.
- XII, 201 p. 35 illus. online resource.
- Security and Cryptology, 10543 2946-1863 ; .
- Security and Cryptology, 10543 .
Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
9783319692845
10.1007/978-3-319-69284-5 doi
Data protection.
Data structures (Computer science).
Information theory.
Computer networks .
Computer systems.
Computers, Special purpose.
Computer science--Mathematics.
Data and Information Security.
Data Structures and Information Theory.
Computer Communication Networks.
Computer System Implementation.
Special Purpose and Application-Based Systems.
Mathematics of Computing.
QA76.9.A25
005.8
Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
9783319692845
10.1007/978-3-319-69284-5 doi
Data protection.
Data structures (Computer science).
Information theory.
Computer networks .
Computer systems.
Computers, Special purpose.
Computer science--Mathematics.
Data and Information Security.
Data Structures and Information Theory.
Computer Communication Networks.
Computer System Implementation.
Special Purpose and Application-Based Systems.
Mathematics of Computing.
QA76.9.A25
005.8