Innovative Security Solutions for Information Technology and Communications: 13th International Conference, SecITC 2020, Bucharest, Romania, November 19–20, 2020, Revised Selected Papers

Author:   Diana Maimut ,  Andrei-George Oprina ,  Damien Sauveron
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   12596
ISBN:  

9783030692544


Pages:   303
Publication Date:   04 February 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Innovative Security Solutions for Information Technology and Communications: 13th International Conference, SecITC 2020, Bucharest, Romania, November 19–20, 2020, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Full Product Details

Author:   Diana Maimut ,  Andrei-George Oprina ,  Damien Sauveron
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   12596
Weight:   0.486kg
ISBN:  

9783030692544


ISBN 10:   303069254
Pages:   303
Publication Date:   04 February 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Elementary Attestation of Cryptographically Useful Composite Moduli.- Off -the-Shelf Security Testing Platform for Contactless Systems.- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption.- New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming.- Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players.- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers.- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping.- Approach to Cryptography from Di erential Geometry with Example.- On using zk-SNARKs and zk-STARKs inblockchain-based identity management.- Manager asks: Which vulnerability must be eliminated first? .- An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM.- Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots.- Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy.- Virtualization and Automation for Cybersecurity Training and Experimentation.- Long-Term Secure Deniable Group Key Establishment.- Card-based Covert Lottery.- Hardware-Accelerated Cryptography for Software-Defined Networks.- with P4.- Security Analysis Using Subjective Attack Trees.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List