My Account Log in

1 option

Innovative Security Solutions for Information Technology and Communications : 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers / edited by Giampaolo Bella, Mihai Doinea, Helge Janicke.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Bella, Giampaolo, editor.
Doinea, Mihai, editor.
Janicke, Helge, editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13809
Language:
English
Subjects (All):
Data protection.
Data and Information Security.
Local Subjects:
Data and Information Security.
Physical Description:
1 online resource (351 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
Summary:
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
Contents:
Interactional Freedom and Cybersecurity
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
Bridges connecting Encryption Schemes
Superpoly Recovery of Grain-128AEAD Using Division Property
On Single-Server Delegation of RSA
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
Statistical tests for symmetric primitives An application to NIST Lightweight finalists
MILP-aided Cryptanalysis of the FUTURE Block Cipher
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input
Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
Activity Detection from Encrypted Remote Desktop Protocol Traffic
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments
AI-Powered Vulnerability Detection for Secure Source Code Development
Towards Verifying Physical Assumption in Card-Based Cryptography
The Security of Quasigroups Based Substitution Permutation Networks
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.
Notes:
Includes bibliographical references and index.
ISBN:
9783031326363
3031326369

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account