Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers /

Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers / [electronic resource] : edited by Pooya Farshim, Emil Simion. - 1st ed. 2017. - XII, 201 p. 35 illus. online resource. - Security and Cryptology, 10543 2946-1863 ; . - Security and Cryptology, 10543 .

Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

9783319692845

10.1007/978-3-319-69284-5 doi


Data protection.
Data structures (Computer science).
Information theory.
Computer networks .
Computer systems.
Computers, Special purpose.
Computer science--Mathematics.
Data and Information Security.
Data Structures and Information Theory.
Computer Communication Networks.
Computer System Implementation.
Special Purpose and Application-Based Systems.
Mathematics of Computing.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in