000 03871nam a22005295i 4500
001 978-3-031-32636-3
003 DE-He213
005 20240423125249.0
007 cr nn 008mamaa
008 230511s2023 sz | s |||| 0|eng d
020 _a9783031326363
_9978-3-031-32636-3
024 7 _a10.1007/978-3-031-32636-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInnovative Security Solutions for Information Technology and Communications
_h[electronic resource] :
_b15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aX, 342 p. 115 illus., 50 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13809
505 0 _aInteractional Freedom and Cybersecurity -- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things -- Bridges connecting Encryption Schemes -- Superpoly Recovery of Grain-128AEAD Using Division Property -- On Single-Server Delegation of RSA -- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy -- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem -- Statistical tests for symmetric primitives An application to NIST Lightweight finalists -- MILP-aided Cryptanalysis of the FUTURE Block Cipher -- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption -- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input -- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function -- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting -- Activity Detection from Encrypted Remote Desktop Protocol Traffic -- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments -- AI-Powered Vulnerability Detection for Secure Source Code Development -- Towards Verifying Physical Assumption in Card-Based Cryptography -- The Security of Quasigroups Based Substitution Permutation Networks -- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.
520 _aThis book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
650 0 _aData protection.
650 1 4 _aData and Information Security.
700 1 _aDoinea, Mihai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJanicke, Helge.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031326356
776 0 8 _iPrinted edition:
_z9783031326370
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13809
856 4 0 _uhttps://doi.org/10.1007/978-3-031-32636-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c176039
_d176039