04546nam 22007575 450 99646533890331620200706045146.03-319-69284-410.1007/978-3-319-69284-5(CKB)4100000000881980(DE-He213)978-3-319-69284-5(MiAaPQ)EBC6281605(MiAaPQ)EBC5592112(Au-PeEL)EBL5592112(OCoLC)1009042431(PPN)220121559(EXLCZ)99410000000088198020171028d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierInnovative Security Solutions for Information Technology and Communications[electronic resource] 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers /edited by Pooya Farshim, Emil Simion1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XII, 201 p. 35 illus.)Security and Cryptology ;105433-319-69283-6 Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. .This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.Security and Cryptology ;10543Computer securityData structures (Computer science)Computer communication systemsArchitecture, ComputerSpecial purpose computersComputer science—MathematicsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer System Implementationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13057Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Computer security.Data structures (Computer science).Computer communication systems.Architecture, Computer.Special purpose computers.Computer science—Mathematics.Systems and Data Security.Data Structures and Information Theory.Computer Communication Networks.Computer System Implementation.Special Purpose and Application-Based Systems.Mathematics of Computing.005.8Farshim Pooyaedthttp://id.loc.gov/vocabulary/relators/edtSimion Emiledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465338903316Innovative Security Solutions for Information Technology and Communications2046982UNISA