Atnaujinkite slapukų nuostatas

Innovative Security Solutions for Information Technology and Communications: 17th International Conference, SecITC 2024, Bucharest, Romania, November 2122, 2024, Revised Selected Papers [Minkštas viršelis]

Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 280 pages, aukštis x plotis: 235x155 mm, 69 Illustrations, black and white; X, 280 p. 69 illus., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 15595
  • Išleidimo metai: 16-Jul-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031877594
  • ISBN-13: 9783031877599
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 280 pages, aukštis x plotis: 235x155 mm, 69 Illustrations, black and white; X, 280 p. 69 illus., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 15595
  • Išleidimo metai: 16-Jul-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031877594
  • ISBN-13: 9783031877599
Kitos knygos pagal šią temą:

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. 

The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.

 

.- Designing Human-centric security protocols.


.- Election Security-by-Design.


.- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine
Collaboration in Incident Handling.


.- Locally Verifiable Signature Schemes: A Study of Aggregate
and Multi-Signatures.


.- Towards Intelligent User Enumeration Based Profiling.


.- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control
Flow Paths for Evaluating Static Analysis Tools.


.- Cyber Threats to Green Hydrogen Production within a Solar Microgrid.


.-Stateful Fuzzing of OPC UA .


.- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms.


.- Card-based Arithmetic Operations and Application to Statistical
Data Aggregation.


.- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with
Constant Multiplicative Depth.


.- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile
Devices.


.- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow
Attacks.


.- Parameterizing Time-Memory Trade-off for Flexible Implementation
of CRYSTALS-Dilithium.


.- QUICPot. A HTTP/3 Protocol Honeypot.


.- Another Lattice Attack Against an RSA-like Cryptosystem.


.- Hybrid solutions for 2PC: How much do they cost?.


.- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.