Innovative Security Solutions for Information Technology and Communications, 1st ed. 2017 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers Security and Cryptology Series
Coordonnateurs : Farshim Pooya, Simion Emil
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Faster Zero-Knowledge Protocols and Applications.- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.- Key-policy Attribute-based Encryption from Bilinear Maps.- Security of Pseudo-Random Number Generators with Input.- Securing the Foundations of Democracy.- Exploring Naccache-Stern Knapsack Encryption.- Proximity Assurances Based on Natural and Artificial Ambient Environments.- Challenges of Federating National Data Access Infrastructures.- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.- Evolution of the McEliece Public Key Encryption Scheme.- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.- Secretly Embedding Trapdoors into Contract Signing Protocols.- On A Key Exchange Protocol.
Includes supplementary material: sn.pub/extras
Date de parution : 10-2017
Ouvrage de 201 p.
15.5x23.5 cm
Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).
Prix indicatif 52,74 €
Ajouter au panierThèmes d’Innovative Security Solutions for Information Technology... :
Mots-clés :
access control; authentication; block ciphers; computer programming; cryptography; embedded systems; encryption; finite element method; integer programming; linear programming; lyapunov methods; network security; project management; public key cryptography; regression analysis; security issues; security model; security systems; software engineering