000 05763nam a22006615i 4500
001 978-3-030-12942-2
003 DE-He213
005 20240730173236.0
007 cr nn 008mamaa
008 190205s2019 sz | s |||| 0|eng d
020 _a9783030129422
_9978-3-030-12942-2
024 7 _a10.1007/978-3-030-12942-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInnovative Security Solutions for Information Technology and Communications
_h[electronic resource] :
_b11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers /
_cedited by Jean-Louis Lanet, Cristian Toma.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXIII, 530 p. 248 illus., 91 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11359
505 0 _aUltralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based EncryptionScheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme.
520 _aThis book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018. The 35 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 0 _aSoftware engineering.
_94138
650 0 _aApplication software.
_9107568
650 0 _aArtificial intelligence.
_93407
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9107569
650 2 4 _aLegal Aspects of Computing.
_953952
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer and Information Systems Applications.
_9107570
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aLanet, Jean-Louis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9107571
700 1 _aToma, Cristian.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9107572
710 2 _aSpringerLink (Online service)
_9107573
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030129415
776 0 8 _iPrinted edition:
_z9783030129439
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11359
_9107574
856 4 0 _uhttps://doi.org/10.1007/978-3-030-12942-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c88824
_d88824