1 option
Innovative Security Solutions for Information Technology and Communications : 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers / edited by Giampaolo Bella, Mihai Doinea, Helge Janicke.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Lecture Notes in Computer Science, 1611-3349 ; 13809
- Language:
- English
- Subjects (All):
- Data protection.
- Data and Information Security.
- Local Subjects:
- Data and Information Security.
- Physical Description:
- 1 online resource (351 pages)
- Edition:
- 1st ed. 2023.
- Place of Publication:
- Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
- Summary:
- This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
- Contents:
- Interactional Freedom and Cybersecurity
- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
- Bridges connecting Encryption Schemes
- Superpoly Recovery of Grain-128AEAD Using Division Property
- On Single-Server Delegation of RSA
- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
- Statistical tests for symmetric primitives An application to NIST Lightweight finalists
- MILP-aided Cryptanalysis of the FUTURE Block Cipher
- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input
- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function
- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
- Activity Detection from Encrypted Remote Desktop Protocol Traffic
- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments
- AI-Powered Vulnerability Detection for Secure Source Code Development
- Towards Verifying Physical Assumption in Card-Based Cryptography
- The Security of Quasigroups Based Substitution Permutation Networks
- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.
- Notes:
- Includes bibliographical references and index.
- ISBN:
- 9783031326363
- 3031326369
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.