Innovative security solutions for in...
International Conference on Security for Information Technology and Communications (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Innovative security solutions for information technology and communications = 15th International Conference, SecITC 2022, virtual event, December 8-9, 2022 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Innovative security solutions for information technology and communications/ edited by Giampaolo Bella, Mihai Doinea, Helge Janicke.
    Reminder of title: 15th International Conference, SecITC 2022, virtual event, December 8-9, 2022 : revised selected papers /
    remainder title: SecITC 2022
    other author: Bella, Giampaolo.
    corporate name: International Conference on Security for Information Technology and Communications
    Published: Cham :Springer Nature Switzerland : : 2023.,
    Description: 1 online resource (x, 342 p.) :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Interactional Freedom and Cybersecurity -- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things -- Bridges connecting Encryption Schemes -- Superpoly Recovery of Grain-128AEAD Using Division Property -- On Single-Server Delegation of RSA -- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy -- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem -- Statistical tests for symmetric primitives An application to NIST Lightweight finalists -- MILP-aided Cryptanalysis of the FUTURE Block Cipher -- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption -- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input -- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function -- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting -- Activity Detection from Encrypted Remote Desktop Protocol Traffic -- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments -- AI-Powered Vulnerability Detection for Secure Source Code Development -- Towards Verifying Physical Assumption in Card-Based Cryptography -- The Security of Quasigroups Based Substitution Permutation Networks -- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-32636-3
    ISBN: 9783031326363
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login