Normal view MARC view ISBD view

Innovative Security Solutions for Information Technology and Communications [electronic resource] : 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers / edited by Pooya Farshim, Emil Simion.

Contributor(s): Farshim, Pooya [editor.] | Simion, Emil [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10543Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XII, 201 p. 35 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319692845.Subject(s): Data protection | Data structures (Computer science) | Information theory | Computer networks  | Computer systems | Computers, Special purpose | Computer science -- Mathematics | Data and Information Security | Data Structures and Information Theory | Computer Communication Networks | Computer System Implementation | Special Purpose and Application-Based Systems | Mathematics of ComputingAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .
In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
    average rating: 0.0 (0 votes)
No physical items for this record

Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

There are no comments for this item.

Log in to your account to post a comment.