Buch, Englisch, 342 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 534 g
15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Buch, Englisch, 342 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 534 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-32635-6
Verlag: Springer
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022.
The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Interactional Freedom and Cybersecurity.- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things.- Bridges connecting Encryption Schemes.- Superpoly Recovery of Grain-128AEAD Using Division Property.- On Single-Server Delegation of RSA.- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy.- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem.- Statistical tests for symmetric primitives An application to NIST Lightweight finalists.- MILP-aided Cryptanalysis of the FUTURE Block Cipher.- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption.- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input.- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function.- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting.- Activity Detection from Encrypted Remote Desktop Protocol Traffic.- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments.- AI-Powered Vulnerability Detection for Secure Source Code Development.- Towards Verifying Physical Assumption in Card-Based Cryptography.- The Security of Quasigroups Based Substitution Permutation Networks.- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.




