000 | 03976nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-52947-4 | ||
003 | DE-He213 | ||
005 | 20240730171009.0 | ||
007 | cr nn 008mamaa | ||
008 | 240120s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031529474 _9978-3-031-52947-4 |
||
024 | 7 |
_a10.1007/978-3-031-52947-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInnovative Security Solutions for Information Technology and Communications _h[electronic resource] : _b16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers / _cedited by Mark Manulis, Diana Maimuţ, George Teşeleanu. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aX, 217 p. 26 illus., 6 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14534 |
|
505 | 0 | _aBASS: Boolean Automorphisms Signature Scheme -- Shpilrain Using Page Offsets for Detecting Control-Flow Anomalies -- Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes -- SDVS Sender-Privacy in the Multi-Party Setting -- Software Mitigation of RISC-V Spectre Attacks -- A Modern Malware-oriented Dynamic Information Retrieval Tool -- M-Sel: A Message Selection Functional Encryption from Simple Tools -- Deniable Public-Key Authenticated Quantum Key Exchange -- Towards a secure and transparent blockchain-based system for e-commerce deliveries -- Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit -- OpenBSD formal driver verification with SeL4 -- An Efficient Small Modulus Test and Its Applications to Delegated Computation without Preprocessing -- Learning Homomorphisms with Rounding and Pseudorandom Function -- Some Results on Related Key-IV Pairs of Espresso. . | |
520 | _aThis book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security. . | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aInformation technology _xManagement. _95368 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Application in Administrative Data Processing. _931588 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _996675 |
700 | 1 |
_aManulis, Mark. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996676 |
|
700 | 1 |
_aMaimuţ, Diana. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996678 |
|
700 | 1 |
_aTeşeleanu, George. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996680 |
|
710 | 2 |
_aSpringerLink (Online service) _996682 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031529467 |
776 | 0 | 8 |
_iPrinted edition: _z9783031529481 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14534 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-52947-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c87345 _d87345 |