default search action
SECITC 2016: Bucharest, Romania
- Ion Bica, Reza Reyhanitabar:
Innovative Security Solutions for Information Technology and Communications - 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10006, 2016, ISBN 978-3-319-47237-9
Invited Talks
- F. Betül Durak, Serge Vaudenay:
Circular Security Reconsidered. 3-19 - Paolo D'Arco, Roberto De Prisco:
Visual Cryptography - Models, Issues, Applications and New Directions. 20-39 - Mozhdeh Farhadi, Jean-Louis Lanet:
Paper Tigers: An Endless Fight. 40-62 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
Security of Identity-Based Encryption Schemes from Quadratic Residues. 63-77
Cryptographic Algorithms and Protocols
- Kashi Neupane:
Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings. 81-91 - Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion:
RSA Weak Public Keys Available on the Internet. 92-102 - Shoichi Hirose, Atsushi Yabumoto:
A Tweak for a PRF Mode of a Compression Function and Its Applications. 103-114 - Shoichi Hirose:
May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽q and Its Application to Information Set Decoding. 115-126 - Bogdan Iancu, Cristian Sandu:
A Cryptographic Approach for Implementing Semantic Web's Trust Layer. 127-136 - Lukasz Krzywiecki:
Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. 137-148 - Cezar Plesca, Mihai Togan, Cristian Lupascu:
Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali Scheme. 149-166 - Estuardo Alpirez Bock, Zoya Dyka, Peter Langendörfer:
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization. 167-178
Security Technologies for ITC
- Alecsandru Patrascu, Stefan Popa:
When Pythons Bite. 181-192 - Dan Lutas, Adrian Colesa, Sándor Lukács, Andrei Lutas:
Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations. 193-208 - Andrei Marghescu, Paul Svasta:
Pushing the Optimization Limits of Ring Oscillator-Based True Random Number Generators. 209-224 - Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion:
TOR - Didactic Pluggable Transport. 225-239 - Christian Wittke, Zoya Dyka, Oliver Skibitzki, Peter Langendörfer:
Preparation of SCA Attacks: Successfully Decapsulating BGA Packages. 240-247 - Sabina Georgiana Radu:
Comparative Analysis of Security Operations Centre Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models. 248-260 - Pardis Pourghomi, Muhammad Qasim Saeed, Pierre E. Abi-Char:
Secure Transaction Authentication Protocol. 261-273 - Ana-Maria Ghimes, Victor Valeriu Patriciu:
Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. 274-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.