04102nam 22007815 450 991048494010332120230810192722.03-319-69284-410.1007/978-3-319-69284-5(CKB)4100000000881980(DE-He213)978-3-319-69284-5(MiAaPQ)EBC6281605(MiAaPQ)EBC5592112(Au-PeEL)EBL5592112(OCoLC)1009042431(PPN)220121559(EXLCZ)99410000000088198020171028d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierInnovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers /edited by Pooya Farshim, Emil Simion1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XII, 201 p. 35 illus.)Security and Cryptology ;105433-319-69283-6 Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.Security and Cryptology ;10543Data protectionData structures (Computer science)Information theoryComputer networksComputer systemsComputers, Special purposeComputer scienceMathematicsData and Information SecurityData Structures and Information TheoryComputer Communication NetworksComputer System ImplementationSpecial Purpose and Application-Based SystemsMathematics of ComputingData protection.Data structures (Computer science).Information theory.Computer networks.Computer systems.Computers, Special purpose.Computer scienceMathematics.Data and Information Security.Data Structures and Information Theory.Computer Communication Networks.Computer System Implementation.Special Purpose and Application-Based Systems.Mathematics of Computing.005.8Farshim Pooyaedthttp://id.loc.gov/vocabulary/relators/edtSimion Emiledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484940103321Innovative Security Solutions for Information Technology and Communications3384102UNINA