


default search action
14th SECITC 2021: Virtual Event
- Peter Y. A. Ryan
, Cristian Toma
:
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13195, Springer 2022, ISBN 978-3-031-17509-1 - Romain Brisse
, Simon Boche, Frédéric Majorczyk, Jean-François Lalande
:
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch. 1-17 - Somanath Tripathy
, Narendra Singh, Divyanshu N. Singh:
ADAM: Automatic Detection of Android Malware. 18-31 - Xiaona Zhang, Yang Liu, Yu Chen:
Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem. 32-45 - Md. Akhtaruzzaman Adnan
, Atika Younus
, Md. Harun Al Kawser
, Natasha Adhikary
, Ahsan Habib
, Rakib Ul Haque
:
Identification of Data Breaches from Public Forums. 46-56 - Abdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain:
A Forensic Framework for Webmail Threat Detection Using Log Analysis. 57-69 - Luan Cardoso dos Santos, Johann Großschädl:
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations. 70-85 - Christian Franck, Johann Großschädl:
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. 86-99 - Emanuele Bellini
, Anna Hambitzer, Matteo Protopapa, Matteo Rossi:
Limitations of the Use of Neural Networks in Black Box Cryptanalysis. 100-124 - Esra Yeniaras
, Murat Cenk
:
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime. 125-144 - Evgnosia-Alexandra Kelesidis:
An Optimization of Bleichenbacher's Oracle Padding Attack. 145-155 - Dániel Zentai
:
UC Analysis of the Randomized McEliece Cryptosystem. 156-164 - Suthee Ruangwises
:
Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$. 165-177 - Xiaojuan Lu, Bohan Li, Shichang Wang, Dongdai Lin:
Conditional Differential Cryptanalysis on Bagua. 178-189 - Li Duan
, Yong Li, Lijun Liao:
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. 190-209 - Li Duan
, Yong Li, Lijun Liao:
Flexible Group Non-interactive Key Exchange in the Standard Model. 210-227 - Mihai-Zicu Mina
, Emil Simion
:
A Multifunctional Modular Implementation of Grover's Algorithm. 228-247 - George Teseleanu
:
Lightweight Swarm Authentication. 248-259 - Diana Maimut
, George Teseleanu
:
New Configurations of Grain Ciphers: Security Against Slide Attacks. 260-285 - Marian Gusatu
, Ruxandra F. Olimid
:
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing. 286-295 - Kashi Neupane:
Long-Term Secure Asymmetric Group Key Agreement. 296-307 - Vlad Constantin Craciun
, Andrei-Catalin Mogage
:
Building Deobfuscated Applications from Polymorphic Binaries. 308-323 - Cristian-Valeriu Toma
, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea:
Viruses, Exploits, Malware and Security Issues on IoT Devices. 324-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.