Innovative security solutions for information technology and communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised selected papers /
Saved in:
Meeting name: | International Conference on Security for Information Technology and Communications (9th : 2016 : Bucharest, Romania) |
---|---|
Imprint: | Cham, Switzerland : Springer, 2016. |
Description: | 1 online resource (x, 287 pages) : illustrations |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 10006 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 10006. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11267702 |
Table of Contents:
- Circular Security Reconsidered
- Visual Cryptography: Models, Issues, Applications and New Directions
- Paper Tigers: An Endless Fight
- Security of Identity-based Encryption Schemes from Quadratic Residues
- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings
- RSA Weak Public Keys Available on the Internet
- A Tweak for a PRF Mode of a Compression Function and Its Applications
- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding
- A Cryptographic Approach for Implementing Semantic Web's Trust Layer
- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme
- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization
- When Pythons Bite
- Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations
- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators
- TOR
- Didactic Pluggable Transport
- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages
- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models
- Secure Transaction Authentication Protocol
- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing.