Innovative security solutions for information technology and communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers /: 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers. (2019)
- Record Type:
- Book
- Title:
- Innovative security solutions for information technology and communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers /: 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers. (2019)
- Main Title:
- Innovative security solutions for information technology and communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers
- Other Titles:
- SecITC 2018
- Further Information:
- Note: Jean-Louis Lanet, Cristian Toma (eds.).
- Editors:
- Lanet, Jean-Louis
Toma, Cristian - Other Names:
- International Conference on Security for Information Technology and Communications, 11th
- Contents:
- Ultralightweight Cryptography - Some thoughts on ten years of efforts.- Android Malware Analysis: from technical difficulties to scientific challenges.- Post-Quantum Cryptography and a (Qu)Bit More.- Normalization of Java source codes.- HiddenApp - Securing Linux applications using ARM TrustZone.- Security Knowledge Management in Open Source Software Communities.- Formal Security Analysis of Cloud-connected Industrial Control Systems.- A Hybrid Searchable Encryption Scheme for Cloud Computing.- Securing Cloud Storage by Transparent Biometric Cryptography.- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.- An Evaluation of OCR Systems against Adversarial Machine Learning.- Intrusion detection and classification with autoencoded deep neural network.- Detecting Malicious Windows Commands Using Natural Language Processing Techniques.- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.- Assuring Privacy in Surfing the Internet.- Roaming Interface Signaling Security for LTE Networks.- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile.- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders.- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods.- Trends in design of ransomware viruses.- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers.- Secure IoT Supply Chain Management Solution using BlockchainUltralightweight Cryptography - Some thoughts on ten years of efforts.- Android Malware Analysis: from technical difficulties to scientific challenges.- Post-Quantum Cryptography and a (Qu)Bit More.- Normalization of Java source codes.- HiddenApp - Securing Linux applications using ARM TrustZone.- Security Knowledge Management in Open Source Software Communities.- Formal Security Analysis of Cloud-connected Industrial Control Systems.- A Hybrid Searchable Encryption Scheme for Cloud Computing.- Securing Cloud Storage by Transparent Biometric Cryptography.- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.- An Evaluation of OCR Systems against Adversarial Machine Learning.- Intrusion detection and classification with autoencoded deep neural network.- Detecting Malicious Windows Commands Using Natural Language Processing Techniques.- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.- Assuring Privacy in Surfing the Internet.- Roaming Interface Signaling Security for LTE Networks.- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile.- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders.- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods.- Trends in design of ransomware viruses.- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers.- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology.- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology.- Development of the unified security requirements of PUFs during the standardization process.- A PUF-based Destructive-private Mutual Authentication RFID Protocol.- Weakened Random Oracle Models with Target Prefix.- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields.- On the security of Jhanwar-Barua Identity-Based Encryption Scheme.- Vulnerabilities of the McEliece variants based on Polar codes.- Binary Data Analysis for Source Code Leakage Assessment.- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks.- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption.- Implementing Searchable Encryption schemes over Multilinear Maps.- A Unified Security Perspective on Legally Fair Contract Signing Protocols.- Relating different Polynomial-LWE problems.- Monoidal encryption over (F2, ·).- Geometric pairwise key-sharing scheme. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (xiii, 530 pages), illustrations (some color)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Information technology -- Security measures -- Congresses
Electronic books - Languages:
- English
- ISBNs:
- 9783030129422
- Related ISBNs:
- 303012942X
9783030129415 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed February 13, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.386043
- Ingest File:
- 02_374.xml