My Account Log in

1 option

Innovative Security Solutions for Information Technology and Communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers / edited by Jean-Louis Lanet, Cristian Toma.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Lanet, Jean-Louis, editor.
Toma, Cristian, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11359.
Security and Cryptology ; 11359
Language:
English
Subjects (All):
Computer security.
Computer networks.
Computers.
Law and legislation.
Software engineering.
Application software.
Artificial intelligence.
Systems and Data Security.
Computer Communication Networks.
Legal Aspects of Computing.
Software Engineering.
Information Systems Applications (incl. Internet).
Artificial Intelligence.
Local Subjects:
Systems and Data Security.
Computer Communication Networks.
Legal Aspects of Computing.
Software Engineering.
Information Systems Applications (incl. Internet).
Artificial Intelligence.
Physical Description:
1 online resource (XIII, 530 pages) : 248 illustrations, 91 illustrations in color.
Edition:
First edition 2019.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018. The 35 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Contents:
Ultralightweight Cryptography - Some thoughts on ten years of efforts
Android Malware Analysis: from technical difficulties to scientific challenges
Post-Quantum Cryptography and a (Qu)Bit More
Normalization of Java source codes
HiddenApp - Securing Linux applications using ARM TrustZone
Security Knowledge Management in Open Source Software Communities
Formal Security Analysis of Cloud-connected Industrial Control Systems
A Hybrid Searchable Encryption Scheme for Cloud Computing
Securing Cloud Storage by Transparent Biometric Cryptography
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks
An Evaluation of OCR Systems against Adversarial Machine Learning
Intrusion detection and classification with autoencoded deep neural network
Detecting Malicious Windows Commands Using Natural Language Processing Techniques
Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks
Assuring Privacy in Surfing the Internet
Roaming Interface Signaling Security for LTE Networks
Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile
Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders
Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods
Trends in design of ransomware viruses
Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology
Development of the unified security requirements of PUFs during the standardization process
A PUF-based Destructive-private Mutual Authentication RFID Protocol
Weakened Random Oracle Models with Target Prefix
An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
Vulnerabilities of the McEliece variants based on Polar codes
Binary Data Analysis for Source Code Leakage Assessment
Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib
A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption
Implementing Searchable Encryption schemes over Multilinear Maps
A Unified Security Perspective on Legally Fair Contract Signing Protocols
Relating different Polynomial-LWE problems
Monoidal encryption over (F2, ·)
Geometric pairwise key-sharing scheme.
Other Format:
Printed edition:
ISBN:
978-3-030-12942-2
9783030129422
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account