This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Faster Zero-Knowledge Protocols and Applications.- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.- Key-policy Attribute-based Encryption from Bilinear Maps.- Security of Pseudo-Random Number Generators with Input.- Securing the Foundations of Democracy.- Exploring Naccache-Stern Knapsack Encryption.- Proximity Assurances Based on Natural and Artificial Ambient Environments.- Challenges of Federating National Data Access Infrastructures.- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.- Evolution of the McEliece Public Key Encryption Scheme.- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.- Secretly Embedding Trapdoors into Contract Signing Protocols.- On A Key Exchange Protocol.
Faster Zero-Knowledge Protocols and Applications.- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.- Key-policy Attribute-based Encryption from Bilinear Maps.- Security of Pseudo-Random Number Generators with Input.- Securing the Foundations of Democracy.- Exploring Naccache-Stern Knapsack Encryption.- Proximity Assurances Based on Natural and Artificial Ambient Environments.- Challenges of Federating National Data Access Infrastructures.- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.- Evolution of the McEliece Public Key Encryption Scheme.- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.- Secretly Embedding Trapdoors into Contract Signing Protocols.- On A Key Exchange Protocol.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826