04436nam 22006615 450 99666846570331620250726130231.09783031877605(electronic bk.)978303187759910.1007/978-3-031-87760-5(MiAaPQ)EBC32246268(Au-PeEL)EBL32246268(CKB)39719112100041(DE-He213)978-3-031-87760-5(EXLCZ)993971911210004120250726d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInnovative Security Solutions for Information Technology and Communications 17th International Conference, SecITC 2024, Bucharest, Romania, November 21–22, 2024, Revised Selected Papers /edited by Luciana Morogan, Peter Roenne, Ion Bica1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (405 pages)Lecture Notes in Computer Science,1611-3349 ;15595Print version: Morogan, Luciana Innovative Security Solutions for Information Technology and Communications Cham : Springer,c2025 9783031877599 -- Designing Human-centric security protocols. -- Election Security-by-Design. -- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. -- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures. -- Towards Intelligent User Enumeration Based Profiling. -- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. -- Cyber Threats to Green Hydrogen Production within a Solar Microgrid. .-Stateful Fuzzing of OPC UA . -- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. -- Card-based Arithmetic Operations and Application to Statistical Data Aggregation. -- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth. -- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. -- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. -- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium. -- QUICPot. A HTTP/3 Protocol Honeypot. -- Another Lattice Attack Against an RSA-like Cryptosystem. -- Hybrid solutions for 2PC: How much do they cost?. -- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC. .This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security. .Lecture Notes in Computer Science,1611-3349 ;15595Data protectionInformation technologyManagementComputer networksSecurity measuresComputer networksData and Information SecurityComputer Application in Administrative Data ProcessingSecurity ServicesMobile and Network SecurityComputer Communication NetworksData protection.Information technologyManagement.Computer networksSecurity measures.Computer networks.Data and Information Security.Computer Application in Administrative Data Processing.Security Services.Mobile and Network Security.Computer Communication Networks.005.8Morogan Luciana1835220Roenne Peter1835221Bica Ion1835222MiAaPQMiAaPQMiAaPQ996668465703316Innovative Security Solutions for Information Technology and Communications4411447UNISA