You are here

Back to top

Innovative Security Solutions for Information Technology and Communications: 11th International Conference, Secitc 2018, Bucharest, Romania, November (Paperback)

Innovative Security Solutions for Information Technology and Communications: 11th International Conference, Secitc 2018, Bucharest, Romania, November Cover Image
By Jean-Louis Lanet (Editor), Cristian Toma (Editor)
$89.99
Usually Ships in 1-5 Days

Description


Ultralightweight Cryptography - Some thoughts on ten years of efforts.- Android Malware Analysis: from technical difficulties to scientific challenges.- Post-Quantum Cryptography and a (Qu)Bit More.- Normalization of Java source codes.- HiddenApp - Securing Linux applications using ARM TrustZone.- Security Knowledge Management in Open Source Software Communities.- Formal Security Analysis of Cloud-connected Industrial Control Systems.- A Hybrid Searchable Encryption Scheme for Cloud Computing.- Securing Cloud Storage by Transparent Biometric Cryptography.- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.- An Evaluation of OCR Systems against Adversarial Machine Learning.- Intrusion detection and classification with autoencoded deep neural network.- Detecting Malicious Windows Commands Using Natural Language Processing Techniques.- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.- Assuring Privacy in Surfing the Internet.- Roaming Interface Signaling Security for LTE Networks.- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile.- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders.- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods.- Trends in design of ransomware viruses.- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers.- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology.- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology.- Development of the unified security requirements of PUFs during the standardization process.- A PUF-based Destructive-private Mutual Authentication RFID Protocol.- Weakened Random Oracle Models with Target Prefix.- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields.- On the security of Jhanwar-Barua Identity-Based Encryption Scheme.- Vulnerabilities of the McEliece variants based on Polar codes.- Binary Data Analysis for Source Code Leakage Assessment.- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks.- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption.- Implementing Searchable Encryption schemes over Multilinear Maps.- A Unified Security Perspective on Legally Fair Contract Signing Protocols.- Relating different Polynomial-LWE problems.- Monoidal encryption over (F2, -).- Geometric pairwise key-sharing scheme.

Product Details
ISBN: 9783030129415
ISBN-10: 3030129411
Publisher: Springer
Publication Date: February 6th, 2019
Pages: 530
Language: English