Innovative security solutions for information technology and communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised selected papers /: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised selected papers. (2015)
- Record Type:
- Book
- Title:
- Innovative security solutions for information technology and communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised selected papers /: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised selected papers. (2015)
- Main Title:
- Innovative security solutions for information technology and communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised selected papers
- Other Titles:
- SECITC 2015
- Further Information:
- Note: Ion Bica, David Naccache, Emil Simion (eds.).
- Editors:
- Bica, Ion, 1971-
Naccache, David, 1967-
(Associate professor), Simion, Emil - Other Names:
- International Conference on Security for Information Technology and Communications, 8th
- Contents:
- Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xxiv, 281 pages), color illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Computer Science
Engineering & Applied Sciences
Computers -- System Administration -- Storage & Retrieval
Computers -- Information Technology
Computers -- Security -- General
Computers -- Hardware -- Network Hardware
Computers -- Programming -- Algorithms
Information retrieval
Coding theory & cryptology
Network hardware
Algorithms & data structures
Computer security
Information storage and retrieva
Data encryption (Computer science)
Computer Communication Networks
Computer software
Computer security
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319271798
3319271792 - Related ISBNs:
- 9783319271781
3319271784 - Notes:
- Note: Includes bibliographical references and author index.
Note: Online resource; title from PDF title page (SpringerLink, viewed January 21, 2016). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.355346
- Ingest File:
- 01_316.xml