LEADER 04102nam 22007815 450 001 9910484940103321 005 20230810192722.0 010 $a3-319-69284-4 024 7 $a10.1007/978-3-319-69284-5 035 $a(CKB)4100000000881980 035 $a(DE-He213)978-3-319-69284-5 035 $a(MiAaPQ)EBC6281605 035 $a(MiAaPQ)EBC5592112 035 $a(Au-PeEL)EBL5592112 035 $a(OCoLC)1009042431 035 $a(PPN)220121559 035 $a(EXLCZ)994100000000881980 100 $a20171028d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications $e10th International Conference, SecITC 2017, Bucharest, Romania, June 8?9, 2017, Revised Selected Papers /$fedited by Pooya Farshim, Emil Simion 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 201 p. 35 illus.) 225 1 $aSecurity and Cryptology ;$v10543 311 $a3-319-69283-6 327 $aFaster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. . 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms. 410 0$aSecurity and Cryptology ;$v10543 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer networks 606 $aComputer systems 606 $aComputers, Special purpose 606 $aComputer science$xMathematics 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aSpecial Purpose and Application-Based Systems 606 $aMathematics of Computing 615 0$aData protection. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aComputers, Special purpose. 615 0$aComputer science$xMathematics. 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aMathematics of Computing. 676 $a005.8 702 $aFarshim$b Pooya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSimion$b Emil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484940103321 996 $aInnovative Security Solutions for Information Technology and Communications$93384102 997 $aUNINA