


default search action
12th SECITC 2019: Bucharest, Romania
- Emil Simion, Rémi Géraud-Stewart:
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12001, Springer 2020, ISBN 978-3-030-41024-7 - Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut
, David Naccache, Peter B. Rønne
, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. 1-20 - Natacha Sylvie Laniado:
The Ups and Downs of Technology in Society. 21-33 - Mario Bischof, Tobias Oder, Tim Güneysu
:
Efficient Microcontroller Implementation of BIKE. 34-49 - Giovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch:
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols. 50-64 - Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. 65-77 - Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama:
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. 78-94 - Mohammed Zitouni, Farid Mokrane:
Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type y2 = x5 +a, x. 95-108 - Lukas Malina
, Sara Ricci
, Petr Dzurenda
, David Smekal
, Jan Hajny
, Tomas Gerlich
:
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. 109-124 - Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier:
White-Box Traitor-Tracing from Tardos Probabilistic Codes. 125-141 - Hiroaki Anada, Yoshifumi Ueshige:
Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability. 142-155 - Mariana Costiuc
, Diana Maimut
, George Teseleanu
:
Physical Cryptography. 156-171 - Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu
, Muhammad Yasin
:
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. 172-192 - Diana Maimut
, Alexandru Stefan Mega
:
Speeding up OMD Instantiations in Hardware. 193-212 - Ion Bica
, Bogdan-Cosmin Chifor
, Stefan-Ciprian Arseni
, Ioana Matei
:
Reputation-Based Security Framework for Internet of Things. 213-226 - Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura:
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API. 227-240 - Camil Jichici, Bogdan Groza, Pal-Stefan Murvay
:
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe. 241-256

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.