LEADER 03703nam 22007095 450 001 9910380748403321 005 20200701025550.0 010 $a3-030-41025-0 024 7 $a10.1007/978-3-030-41025-4 035 $a(CKB)4100000010480273 035 $a(DE-He213)978-3-030-41025-4 035 $a(MiAaPQ)EBC6126366 035 $a(PPN)242979130 035 $a(EXLCZ)994100000010480273 100 $a20200227d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications $e12th International Conference, SecITC 2019, Bucharest, Romania, November 14?15, 2019, Revised Selected Papers /$fedited by Emil Simion, Rémi Géraud-Stewart 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XXII, 257 p. 160 illus., 29 illus. in color.) 225 1 $aSecurity and Cryptology ;$v12001 311 $a3-030-41024-2 327 $aCryptography -- Information security -- Key Exchange algorithms -- Post-quantum cryptography -- Privacy -- Security -- IoT architectures -- Elliptic curves -- Mobil critical communications. . 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security. 410 0$aSecurity and Cryptology ;$v12001 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aComputer communication systems 606 $aArchitecture, Computer 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer communication systems. 615 0$aArchitecture, Computer. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 676 $a005.8 702 $aSimion$b Emil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGéraud-Stewart$b Rémi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910380748403321 996 $aInnovative Security Solutions for Information Technology and Communications$93384102 997 $aUNINA